Dawei Wang, Yang Zhao, Xiao Tang, D. Zhai, Ziping Wei, Haotong Cao, Wei Liang
{"title":"带缓冲区的中继网络的安全链路选择","authors":"Dawei Wang, Yang Zhao, Xiao Tang, D. Zhai, Ziping Wei, Haotong Cao, Wei Liang","doi":"10.1109/WoWMoM51794.2021.00064","DOIUrl":null,"url":null,"abstract":"Buffer-aided relay technique can improve the diversity order and offer secrecy provision. To further improve secrecy performance, this paper proposes a secure link selection for relay networks where a new link selection policy is first designed under the constraint on the buffers and channel states using a Markov chain. The stationary state and the corresponding state transition matrix can be derived, and they are used to analyze the secrecy performance. Through the derivation of secrecy outage probability, we can get its closed-form expressions. Numerical results demonstrate that the proposed secure transmission scheme has a better performance than the conventional buffer-aided secure transmission schemes in terms of secrecy outage probability.","PeriodicalId":131571,"journal":{"name":"2021 IEEE 22nd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Link Selection for Relay Networks with Buffer\",\"authors\":\"Dawei Wang, Yang Zhao, Xiao Tang, D. Zhai, Ziping Wei, Haotong Cao, Wei Liang\",\"doi\":\"10.1109/WoWMoM51794.2021.00064\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Buffer-aided relay technique can improve the diversity order and offer secrecy provision. To further improve secrecy performance, this paper proposes a secure link selection for relay networks where a new link selection policy is first designed under the constraint on the buffers and channel states using a Markov chain. The stationary state and the corresponding state transition matrix can be derived, and they are used to analyze the secrecy performance. Through the derivation of secrecy outage probability, we can get its closed-form expressions. Numerical results demonstrate that the proposed secure transmission scheme has a better performance than the conventional buffer-aided secure transmission schemes in terms of secrecy outage probability.\",\"PeriodicalId\":131571,\"journal\":{\"name\":\"2021 IEEE 22nd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 22nd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WoWMoM51794.2021.00064\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 22nd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WoWMoM51794.2021.00064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Link Selection for Relay Networks with Buffer
Buffer-aided relay technique can improve the diversity order and offer secrecy provision. To further improve secrecy performance, this paper proposes a secure link selection for relay networks where a new link selection policy is first designed under the constraint on the buffers and channel states using a Markov chain. The stationary state and the corresponding state transition matrix can be derived, and they are used to analyze the secrecy performance. Through the derivation of secrecy outage probability, we can get its closed-form expressions. Numerical results demonstrate that the proposed secure transmission scheme has a better performance than the conventional buffer-aided secure transmission schemes in terms of secrecy outage probability.