eprintid: 10047626 rev_number: 22 eprint_status: archive userid: 608 dir: disk0/10/04/76/26 datestamp: 2018-05-03 11:15:33 lastmod: 2021-12-01 23:28:30 status_changed: 2019-01-29 14:48:35 type: article metadata_visibility: show creators_name: Kuhestani, A creators_name: Mohammadi, A creators_name: Wong, KK creators_name: Yeoh, PL creators_name: Moradikia, M creators_name: Khandaker, MRA title: Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks ispublished: inpress divisions: UCL divisions: B04 divisions: C05 divisions: F46 keywords: Physical layer security, Untrusted relay, Hardware imperfections, Optimal power allocation, Hardware design note: This work is licensed under a Creative Commons Attribution 3.0 License. For more information, see http://creativecommons.org/licenses/by/3.0/. abstract: CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA) system, while the rest are equipped with a single-antenna. To prevent the untrusted relay from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as destination-based cooperative jamming (DBCJ). Given this system model, novel closed-form expressions are presented in the high signal-to-noise ratio (SNR) regime for the ergodic secrecy rate (ESR) and the secrecy outage probability (SOP). We further improve the secrecy performance of the system by optimizing the associated hardware design. The results reveal that by beneficially distributing the tolerable hardware imperfections across the transmission and reception radio-frequency (RF) front ends of each node, the system & #x2019;s secrecy rate may be improved. The engineering insight is that equally sharing the total imperfections at the relay between the transmitter and the receiver provides the best secrecy performance. Numerical results illustrate that the proposed OPA together with the most appropriate hardware design significantly increases the secrecy rate. date: 2018-04-10 date_type: published official_url: https://doi.org/10.1109/TWC.2018.2822286 oa_status: green full_text_type: pub language: eng primo: open primo_central: open_green article_type_text: Article in Press verified: verified_manual elements_id: 1551790 doi: 10.1109/TWC.2018.2822286 lyricists_name: Khandaker, Muhammad lyricists_name: Wong, Kai-Kit lyricists_id: MRAKH50 lyricists_id: KWONG98 actors_name: Bracey, Alan actors_id: ABBRA90 actors_role: owner full_text_status: public publication: IEEE Transactions on Wireless Communications volume: 17 number: 7 pagerange: 4302-4314 issn: 1536-1276 citation: Kuhestani, A; Mohammadi, A; Wong, KK; Yeoh, PL; Moradikia, M; Khandaker, MRA; (2018) Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks. IEEE Transactions on Wireless Communications , 17 (7) pp. 4302-4314. 10.1109/TWC.2018.2822286 <https://doi.org/10.1109/TWC.2018.2822286>. (In press). Green open access document_url: https://discovery.ucl.ac.uk/id/eprint/10047626/1/08334689.pdf