Cooperative beamforming and user selection for physical layer security in relay systems

Tiep M. Hoang, Trung Q. Duong, Himal A. Suraweera, Chintha Tellambura, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

A cooperative network in which confidential messages are conveyed from a source to a legitimate destination with the help of decode-and-forward relays in the presence of a malicious eavesdropper is considered. Tight upper bounds on the ergodic secrecy rate are derived in the cases of i) cooperative beamforming and ii) multi-user selection. Further, a new concept of cooperative diversity gain, namely, adapted cooperative diversity gain (ACDG), is investigated. It is shown that the ACDG can be seen as an effective metric to evaluate the security level of a cooperative wireless network in the presence of eavesdroppers. Also, the ACDG obtained in the cooperative beamforming scenario is equal to the traditional cooperative diversity gain of traditional multiple-input single-output networks, while the ACDG obtained in the multiuser scenario is equal to that of traditional single-input multiple-output networks.

Original languageEnglish (US)
Title of host publication2015 IEEE Global Communications Conference, GLOBECOM 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479959525
DOIs
StatePublished - Jan 1 2015
Event58th IEEE Global Communications Conference, GLOBECOM 2015 - San Diego, United States
Duration: Dec 6 2015Dec 10 2015

Publication series

Name2015 IEEE Global Communications Conference, GLOBECOM 2015

Other

Other58th IEEE Global Communications Conference, GLOBECOM 2015
Country/TerritoryUnited States
CitySan Diego
Period12/6/1512/10/15

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Communication

Fingerprint

Dive into the research topics of 'Cooperative beamforming and user selection for physical layer security in relay systems'. Together they form a unique fingerprint.

Cite this