Zobrazit minimální záznam

dc.contributor.authorPhu, Tran Tin
dc.contributor.authorDang, The Hung
dc.contributor.authorDuy, Tran Trung
dc.contributor.authorVozňák, Miroslav
dc.date.accessioned2018-01-22T09:18:47Z
dc.date.available2018-01-22T09:18:47Z
dc.date.issued2017
dc.identifier.citationAdvances in electrical and electronic engineering. 2017, vol. 15, no. 4, p. 591-597cs
dc.identifier.issn1336-1376
dc.identifier.issn1804-3119
dc.identifier.urihttp://hdl.handle.net/10084/123247
dc.description.abstractIn this paper, we evaluate system performances of a multi-hop relay protocol with presence of an active eavesdropper. In the proposed protocol, a source attempts to transmit its data to a destination with assistance of multiple intermediate relays. From the eavesdropping Channel State Information (CSI) estimated, the source and relays adjust their transmit power so that the eavesdropper cannot overhear the transmitted data. Moreover, to enhance throughput for the proposed system, Non-Orthogonal Multiple Access (NOMA) technique with a simple power allocation is also proposed. We derive exact closed-form expressions of the Outage Probability (OP) and throughput for the data transmission over Rayleigh fading channel. In addition, when the CSI estimation is imperfect, Intercept Probability (IP) at the eavesdropper is derived. Finally, Monte Carlo simulations are presented to verify the theoretical derivations.cs
dc.format.extent510381 bytes
dc.format.mimetypeapplication/pdf
dc.languageNeuvedenocs
dc.language.isoencs
dc.publisherVysoká škola báňská - Technická univerzita Ostravacs
dc.relation.ispartofseriesAdvances in electrical and electronic engineeringcs
dc.relation.urihttp://dx.doi.org/10.15598/aeee.v15i4.2386
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectintercept probabilitycs
dc.subjectmulti-hop relay protocolcs
dc.subjectnon-orthogonal multiple accesscs
dc.subjectoutage probabilitycs
dc.subjectphysical-layer securitycs
dc.subjectthroughputcs
dc.titleSecurity-reliability analysis of noma-based multi-hop relay networks in presence of an active eavesdropper with imperfect eavesdropping CSIcs
dc.typearticlecs
dc.identifier.doi10.15598/aeee.v15i4.2386
dc.rights.accessopenAccess
dc.type.versionpublishedVersion
dc.type.statusPeer-reviewed
dc.identifier.wos000424328700003


Soubory tohoto záznamu

Tento záznam se objevuje v následujících kolekcích

Zobrazit minimální záznam

http://creativecommons.org/licenses/by/4.0/
Kromě případů, kde je uvedeno jinak, licence tohoto záznamu je http://creativecommons.org/licenses/by/4.0/