eprintid: 10047626
rev_number: 22
eprint_status: archive
userid: 608
dir: disk0/10/04/76/26
datestamp: 2018-05-03 11:15:33
lastmod: 2021-12-01 23:28:30
status_changed: 2019-01-29 14:48:35
type: article
metadata_visibility: show
creators_name: Kuhestani, A
creators_name: Mohammadi, A
creators_name: Wong, KK
creators_name: Yeoh, PL
creators_name: Moradikia, M
creators_name: Khandaker, MRA
title: Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks
ispublished: inpress
divisions: UCL
divisions: B04
divisions: C05
divisions: F46
keywords: Physical layer security,
Untrusted relay,
Hardware imperfections,
Optimal power allocation,
Hardware design
note: This work is licensed under a Creative Commons Attribution 3.0 License. For more information, see http://creativecommons.org/licenses/by/3.0/.
abstract: CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA) system, while the rest are equipped with a single-antenna. To prevent the untrusted relay from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as destination-based cooperative jamming (DBCJ). Given this system model, novel closed-form expressions are presented in the high signal-to-noise ratio (SNR) regime for the ergodic secrecy rate (ESR) and the secrecy outage probability (SOP). We further improve the secrecy performance of the system by optimizing the associated hardware design. The results reveal that by beneficially distributing the tolerable hardware imperfections across the transmission and reception radio-frequency (RF) front ends of each node, the system & #x2019;s secrecy rate may be improved. The engineering insight is that equally sharing the total imperfections at the relay between the transmitter and the receiver provides the best secrecy performance. Numerical results illustrate that the proposed OPA together with the most appropriate hardware design significantly increases the secrecy rate.
date: 2018-04-10
date_type: published
official_url: https://doi.org/10.1109/TWC.2018.2822286
oa_status: green
full_text_type: pub
language: eng
primo: open
primo_central: open_green
article_type_text: Article in Press
verified: verified_manual
elements_id: 1551790
doi: 10.1109/TWC.2018.2822286
lyricists_name: Khandaker, Muhammad
lyricists_name: Wong, Kai-Kit
lyricists_id: MRAKH50
lyricists_id: KWONG98
actors_name: Bracey, Alan
actors_id: ABBRA90
actors_role: owner
full_text_status: public
publication: IEEE Transactions on Wireless Communications
volume: 17
number: 7
pagerange: 4302-4314
issn: 1536-1276
citation:        Kuhestani, A;    Mohammadi, A;    Wong, KK;    Yeoh, PL;    Moradikia, M;    Khandaker, MRA;      (2018)    Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks.                   IEEE Transactions on Wireless Communications , 17  (7)   pp. 4302-4314.    10.1109/TWC.2018.2822286 <https://doi.org/10.1109/TWC.2018.2822286>.    (In press).    Green open access   
 
document_url: https://discovery.ucl.ac.uk/id/eprint/10047626/1/08334689.pdf