

Author: Sun Xiaojun
Publisher: Springer Publishing Company
ISSN: 0929-6212
Source: Wireless Personal Communications, Vol.70, Iss.4, 2013-06, pp. : 1633-1652
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
This work presents theoretical analysis on security performance for relay selections based on either statistical or instantaneous channel state information (CSI) of the eavesdropper (CSI-E) channels in a decode-and-forward relaying network. By considering security constraints, we have derived exact expressions for the average secrecy rate and the secrecy outage probability. Moreover, analytical expressions of the false secrecy probability are derived for the suboptimal relay selection based on statistical CSI-E, which are used as the constrained functions of new selection metrics. Furthermore, our work achieves a better tradeoff between the outage probability and the false secrecy probability. The accuracy of our performance analysis is verified by simulation results.
Related content










By Abrar Muhammad Gui Xiang Punchihewa Amal
International Journal of Wireless Information Networks, Vol. 20, Iss. 4, 2013-12 ,pp. :