logo

SCIENTIA SINICA Informationis, Volume 46 , Issue 7 : 925-936(2016) https://doi.org/10.1360/N112015-00265

An analysis of secrecy outage performance of DF and RF \\relaying SIMO system with imperfect CSI

More info
  • ReceivedApr 14, 2016
  • AcceptedMay 10, 2016
  • PublishedJun 27, 2016

Abstract


Funded by

国家自然科学基金(61401372)

国家自然科学基金(61531016)

教育部高校博士点新教师基金(20130182120017)

重庆市基础与前沿研究计划(cstc2013jcyjA40040)

中央高校基本科研业务经费(XDJK2015B023)

中央高校基本科研业务经费(XDJK2016A011)


References

[1] Wyner A D. The wire-tap channel. Bell Syst Tech J, 1975, 54: 1355-1387 CrossRef Google Scholar

[2] Tang C, Pan G, Li T. Secrecy outage analysis of underlay cognitive radio unit over Nakagami-{\itshape m\/} fading channels. IEEE Wirel Commun Lett, 2014, 3: 609-612 CrossRef Google Scholar

[3] Pan G, Tang C, Zhang X, et al. Physical layer security over non-small scale fading channels. IEEE Trans Veh Tech, 2016, 65: 1326-1339 CrossRef Google Scholar

[4] Dong L, Han Z, Petropulu A P, et al. Improving wireless physical layer security via cooperating relays. IEEE Trans Sig Process, 2010, 58: 1975-1887. Google Scholar

[5] Zhong B, Wu M G, Li T, et al. Physical layer security via maximal ratio combining and relay selection over Rayleigh fading channels. Sci China Inf Sci, 2016, 59: 062305-1887 CrossRef Google Scholar

[6] Zhao H, Tan Y, Pan G, et al. Secrecy outage on transmit antenna selection/maximal ratio caombining in MIMO cognitive radio networks. IEEE Trans Veh Tech, in press. doi: 10.1109/TVT.2016.2529704. Google Scholar

[7] Ha X N, Ha H N, Tho L N. Diversity analysis of relay selection schemes for two-way wireless relay networks. Wirel Pers Commun 2011, 59: 173-189. Google Scholar

[8] Mo J, Tao M, Liu Y. Relay placement for physical layer security: a secure connection perspective. IEEE Commun Lett, 2012, 16: 878-881 CrossRef Google Scholar

[9] Wang H, Liu F, Yang M. Joint cooperative beamforming, jamming, and power allocation to secure AF relay systems. IEEE Trans Veh Tech, 2015, 64: 4893-4898 CrossRef Google Scholar

[10] Tran D D, Ha D B, Vu T H, et al. Secrecy analysis with MRC/SC-based eavesdropper over heterogeneous channels. IETE J Res, 2015, 61: 363-371 CrossRef Google Scholar

[11] Singh A D, Subadar R. Capacity of dual MRC with adaptive transmitters over non-identical TWDP fading channels. In: Proceedings of Computer Engineering and Applications, Ghaziabad, 2015. 93-97. Google Scholar

[12] Mohamed S A, Marvin K S. Performance of coherent receivers with hybrid SC/MRC over Nakagami- $m$ fading channels. IEEE Trans Veh Tech, 1999, 48: 1155-1164 CrossRef Google Scholar

[13] Zhao H, Tan Y, Pan G, et al. Ergodic secrecy capacity of MRC/SC in SIMO wiretap systems with imperfect CSI. Front Inform Tech Electron Eng, in press. doi: 10.1631/FITEE.1500430. Google Scholar

[14] Bello P, Nelin B D. Predection diversity combining with selectively fading channels. IRE Trans Commun Syst, 1962, 10: 32-42 CrossRef Google Scholar

[15] Gans M J. The effect of Gaussian error in maximal ratio combiners. IEEE Trans Commun Tech, 1971, 19: 492-500 CrossRef Google Scholar

[16] Shrestha A P, Kwark K S. On maximal ratio diversity with weighting errors for physical layer security. IEEE Commun Lett, 2014, 18: 580-583 CrossRef Google Scholar

[17] Zhao H, Pan G F. Analysis of secure communications for a DF and RF relaying SIMO system with Gauss errors. Sci Sin Inform, 2016, 46: 350-360 [赵辉, 潘高峰. Gauss 信道估计误差下DF 与RF 中继SIMO 系统保密通信性能分析. 中国科学: 信息科学, 2016, 46: 350-360]. Google Scholar

[18] Hu Y, Tao Y. Secrecy outage on transmit antenna selection with weighing errors at maximal-ratio combiners. IEEE Commun Lett, 2015, 4: 597-600 CrossRef Google Scholar

[19] Tomiuk B R, Beaulieu N C, Abu-Dayya A A. General forms for maximal ratio diversity with weighting errors. IEEE Trans Commun, 1999, 47: 488-492 CrossRef Google Scholar

[20] Gradshteyn I S, Ryzhik I M. Table of Integrals, Series, and Products. 7th ed. London: Academic, 2007. Google Scholar

[21] Koyluoglu O O, Koksal C E, Gamal H E. On secrecy capacity scaling in wireless networks. IEEE Trans Inf Theory, 2012, 58: 3000-3015 CrossRef Google Scholar