TY - GEN
T1 - Physical layer security via maximal ratio combining and relay selection over Rayleigh fading channel
AU - Li, Tong
AU - Zhang, Tianyu
AU - Zhong, Bin
AU - Zhang, Zhongshan
AU - Vasilakos, Athanasios V.
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/12/1
Y1 - 2015/12/1
N2 - The impact of both maximal ratio combining (MRC) and relay selection on the physical layer security in wireless communication systems is studied by analyzing some important factors, including the probability characteristic of the legitimate receiver (Bob) and malicious eavesdropper (Eve)'s end-to-end signal-to-noise ratio (SNR), the secrecy outage probability, and the average secrecy channel capacity over Rayleigh fading Channel. We assume that Bob receives its data from both the relay and the source by cooperative communication, provided that MRC is employed at the receiver. Compared to the conventional MRC methods, a higher spatial diversity order can be exploited by performing relay selection in the proposed method, as validated via both theoretical analysis and numerical simulation. The theoretical closed-form expressions for some figures of merit, e.g., the secrecy outage probability and the average secrecy capacity, are all consistent with the numerical results.
AB - The impact of both maximal ratio combining (MRC) and relay selection on the physical layer security in wireless communication systems is studied by analyzing some important factors, including the probability characteristic of the legitimate receiver (Bob) and malicious eavesdropper (Eve)'s end-to-end signal-to-noise ratio (SNR), the secrecy outage probability, and the average secrecy channel capacity over Rayleigh fading Channel. We assume that Bob receives its data from both the relay and the source by cooperative communication, provided that MRC is employed at the receiver. Compared to the conventional MRC methods, a higher spatial diversity order can be exploited by performing relay selection in the proposed method, as validated via both theoretical analysis and numerical simulation. The theoretical closed-form expressions for some figures of merit, e.g., the secrecy outage probability and the average secrecy capacity, are all consistent with the numerical results.
UR - http://www.scopus.com/inward/record.url?scp=84958047669&partnerID=8YFLogxK
U2 - 10.1109/PIMRC.2015.7343372
DO - 10.1109/PIMRC.2015.7343372
M3 - Conference contribution
AN - SCOPUS:84958047669
T3 - IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
SP - 612
EP - 616
BT - 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 26th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2015
Y2 - 30 August 2015 through 2 September 2015
ER -