TY - JOUR
T1 - Secrecy analysis of amplify-and-forward relaying networks with zero forcing
AU - Salem, Abdelhamid
AU - Hamdi, Khairi Ashour
PY - 2017/9/28
Y1 - 2017/9/28
N2 - In this study, the ergodic secrecy capacity and the corresponding outage probability of two-hop amplify-and-forward relaying system in the presence of a passive eavesdropper are analysed. In order to improve the security, in this study, zero-forcing (ZF) scheme is implemented at different locations in the system. The effect of the ZF-based scheme on the system security is considered for three different scenarios, based on where the ZF scheme is applied, namely, (i) ZF receivers at the relay and destination nodes, (ii) ZF precoders at the source and relay nodes, and (iii) ZF precoders/receivers at the relay nodes. For each scenario, explicit analytical expressions for the ergodic secrecy capacity and secrecy outage probability are derived. Monte Carlo simulations are also provided to validate the analysis. Results show that increasing the number of source, relay and/or destination nodes can be favourable or unfavourable to the system security and the significance of this enhancement/degradation depends on the particular scenario deployed. In addition, the system security improves with increasing the source and/or relay power.
AB - In this study, the ergodic secrecy capacity and the corresponding outage probability of two-hop amplify-and-forward relaying system in the presence of a passive eavesdropper are analysed. In order to improve the security, in this study, zero-forcing (ZF) scheme is implemented at different locations in the system. The effect of the ZF-based scheme on the system security is considered for three different scenarios, based on where the ZF scheme is applied, namely, (i) ZF receivers at the relay and destination nodes, (ii) ZF precoders at the source and relay nodes, and (iii) ZF precoders/receivers at the relay nodes. For each scenario, explicit analytical expressions for the ergodic secrecy capacity and secrecy outage probability are derived. Monte Carlo simulations are also provided to validate the analysis. Results show that increasing the number of source, relay and/or destination nodes can be favourable or unfavourable to the system security and the significance of this enhancement/degradation depends on the particular scenario deployed. In addition, the system security improves with increasing the source and/or relay power.
UR - http://www.scopus.com/inward/record.url?scp=85030865584&partnerID=8YFLogxK
U2 - 10.1049/iet-com.2017.0215
DO - 10.1049/iet-com.2017.0215
M3 - Article
AN - SCOPUS:85030865584
SN - 1751-8628
VL - 11
SP - 2181
EP - 2189
JO - IET Communications
JF - IET Communications
IS - 14
ER -