Home > Research > Publications & Outputs > Secure Source-Relay Link Based Threshold DF Rel...

Electronic data

  • 1-s2.0-S1434841117324032-main

    Rights statement: This is the author’s version of a work that was accepted for publication in AEU - International Journal of Electronics and Communications. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in AEU - International Journal of Electronics and Communications, 85, 2018 DOI: 10.1016/j.aeue.2018.01.002

    Accepted author manuscript, 534 KB, PDF document

    Available under license: CC BY-NC-ND: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License

Links

Text available via DOI:

View graph of relations

Secure Source-Relay Link Based Threshold DF Relaying Scheme

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published
Close
<mark>Journal publication date</mark>02/2018
<mark>Journal</mark>AEÜ - International Journal of Electronics and Communications
Volume85
Number of pages6
Pages (from-to)144-149
Publication StatusPublished
Early online date6/01/18
<mark>Original language</mark>English

Abstract

In this work, a dual-hop cooperative system, in which there are a Source-Destination (S-D) pair, a relay node (R) and an eavesdropper (E), which attempts to eavesdrop the confidential message sent by S and forwarded by R, is considered. In order to enhance the system performance and save the system resource, we propose an S - R link based threshold decode-and-forward (DF) relaying scheme for R to decide whether to aid S-D pair’s information transmission or not, other than the traditional DF relaying scheme. The secrecy outage performance of the considered system is investigated and the closed-form analytical expression for secrecy outage probability is derived and verified via Monte-Carlo simulations.

Bibliographic note

This is the author’s version of a work that was accepted for publication in AEU - International Journal of Electronics and Communications. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in AEU - International Journal of Electronics and Communications, 85, 2018 DOI: 10.1016/j.aeue.2018.01.002