Relay selection for secure cooperative networks with jamming
IEEE Transactions on Wireless Communications
Improving wireless physical layer security via cooperating relays
IEEE Transactions on Signal Processing
Secure transmission with multiple antennas I: the MISOME wiretap channel
IEEE Transactions on Information Theory
IEEE Transactions on Signal Processing
Two-hop secure communication using an untrusted relay
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
IEEE Transactions on Wireless Communications - Part 2
Guaranteeing Secrecy using Artificial Noise
IEEE Transactions on Wireless Communications
Broadcast channels with confidential messages
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Wireless Information-Theoretic Security
IEEE Transactions on Information Theory
The Relay–Eavesdropper Channel: Cooperation for Secrecy
IEEE Transactions on Information Theory
On the Secrecy Capacity of Fading Channels
IEEE Transactions on Information Theory
Relay-based deployment concepts for wireless and mobile broadband radio
IEEE Communications Magazine
Wireless Personal Communications: An International Journal
Wireless Personal Communications: An International Journal
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
This work presents theoretical analysis on security performance for relay selections based on either statistical or instantaneous channel state information (CSI) of the eavesdropper (CSI-E) channels in a decode-and-forward relaying network. By considering security constraints, we have derived exact expressions for the average secrecy rate and the secrecy outage probability. Moreover, analytical expressions of the false secrecy probability are derived for the suboptimal relay selection based on statistical CSI-E, which are used as the constrained functions of new selection metrics. Furthermore, our work achieves a better tradeoff between the outage probability and the false secrecy probability. The accuracy of our performance analysis is verified by simulation results.