Optimized secure and energy-efficient transmission in an untrusted relay network

Tamer Mekkawy, Rugui Yao, Fei Xu, Ling Wang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, a near Optimum Power Allocation (OPA) for a cooperative jamming relay network is proposed, by using physical layer security to protect the user's messages from relay's interception. The network uses Amplify and Forward (AF) relay to enlarge the coverage area, however the relay is untrusted. By defining secure Energy Efficiency (EE) as the ratio of the instantaneous secrecy rate to the total power consumption to measure the performance of the network. To simplify such optimization problem, an approximated OPA on the basis of Taylor expansion is derived. The numerical results show that the approximated OPA error does not exceed 1% even in the worst case, which verifies the correctness and lower complexity of the proposed algorithm.

Original languageEnglish
Title of host publication2017 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Electronic)9781538631409
DOIs
StatePublished - 29 Dec 2017
Event7th IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2017 - Xiamen, Fujian, China
Duration: 22 Oct 201725 Oct 2017

Publication series

Name2017 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2017
Volume2017-January

Conference

Conference7th IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2017
Country/TerritoryChina
CityXiamen, Fujian
Period22/10/1725/10/17

Keywords

  • Amplify-and-forward
  • Cooperative jamming
  • Energy efficiency
  • Optimum power allocation
  • Secrecy rate

Fingerprint

Dive into the research topics of 'Optimized secure and energy-efficient transmission in an untrusted relay network'. Together they form a unique fingerprint.

Cite this