Secure Transmission in Cooperative Relaying Networks With Multiple Antennas

@article{Huang2016SecureTI,
  title={Secure Transmission in Cooperative Relaying Networks With Multiple Antennas},
  author={Yuzhen Huang and Jinlong Wang and Caijun Zhong and Trung Quang Duong and George K. Karagiannidis},
  journal={IEEE Transactions on Wireless Communications},
  year={2016},
  volume={15},
  pages={6843-6856}
}
We investigate the secrecy performance of dual-hop amplify-and-forward multi-antenna relaying systems over Rayleigh fading channels, considering the direct link between the source and the destination. In order to exploit the available direct link and the multiple antennas for secrecy improvement, different linear processing schemes at the relay and different diversity combining techniques at the destination are proposed, namely: 1) zero-forcing/maximal ratio combining (ZF/MRC); 2) ZF/selection… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 33 CITATIONS

Industrial Networks and Intelligent Systems

  • Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
  • 2017
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Improving the Security of Cooperative Relaying Networks with Multiple Antennas

  • 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring)
  • 2016
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

  • Sensors
  • 2016
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Cognitive Radio Oriented Wireless Networks

  • Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
  • 2018

References

Publications referenced by this paper.
SHOWING 1-10 OF 41 REFERENCES

Large System Secrecy Rate Analysis for SWIPT MIMO Wiretap Channels

  • IEEE Transactions on Information Forensics and Security
  • 2016
VIEW 1 EXCERPT

Secrecy Transmission With a Helper: To Relay or to Jam

  • IEEE Transactions on Information Forensics and Security
  • 2015
VIEW 1 EXCERPT

Secure Transmission for Multiuser Relay Networks

  • IEEE Transactions on Wireless Communications
  • 2015
VIEW 2 EXCERPTS

Similar Papers

Loading similar papers…