Kuhestani, A;
Mohammadi, A;
Wong, KK;
Yeoh, PL;
Moradikia, M;
Khandaker, MRA;
(2018)
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks.
IEEE Transactions on Wireless Communications
, 17
(7)
pp. 4302-4314.
10.1109/TWC.2018.2822286.
(In press).
Preview |
Text
08334689.pdf - Published Version Download (2MB) | Preview |
Abstract
CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA) system, while the rest are equipped with a single-antenna. To prevent the untrusted relay from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as destination-based cooperative jamming (DBCJ). Given this system model, novel closed-form expressions are presented in the high signal-to-noise ratio (SNR) regime for the ergodic secrecy rate (ESR) and the secrecy outage probability (SOP). We further improve the secrecy performance of the system by optimizing the associated hardware design. The results reveal that by beneficially distributing the tolerable hardware imperfections across the transmission and reception radio-frequency (RF) front ends of each node, the system & #x2019;s secrecy rate may be improved. The engineering insight is that equally sharing the total imperfections at the relay between the transmitter and the receiver provides the best secrecy performance. Numerical results illustrate that the proposed OPA together with the most appropriate hardware design significantly increases the secrecy rate.
Type: | Article |
---|---|
Title: | Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks |
Open access status: | An open access version is available from UCL Discovery |
DOI: | 10.1109/TWC.2018.2822286 |
Publisher version: | https://doi.org/10.1109/TWC.2018.2822286 |
Language: | English |
Additional information: | This work is licensed under a Creative Commons Attribution 3.0 License. For more information, see http://creativecommons.org/licenses/by/3.0/. |
Keywords: | Physical layer security, Untrusted relay, Hardware imperfections, Optimal power allocation, Hardware design |
UCL classification: | UCL UCL > Provost and Vice Provost Offices > UCL BEAMS UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Electronic and Electrical Eng |
URI: | https://discovery.ucl.ac.uk/id/eprint/10047626 |




Archive Staff Only
![]() |
View Item |