All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Security-reliability analysis of noma-based multi-hop relay networks in presence of an active eavesdropper with imperfect eavesdropping CSI

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F17%3A10236481" target="_blank" >RIV/61989100:27240/17:10236481 - isvavai.cz</a>

  • Alternative codes found

    RIV/61989100:27740/17:10236481

  • Result on the web

    <a href="http://advances.utc.sk/index.php/AEEE/article/view/2386" target="_blank" >http://advances.utc.sk/index.php/AEEE/article/view/2386</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.15598/aeee.v15i4.2386" target="_blank" >10.15598/aeee.v15i4.2386</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Security-reliability analysis of noma-based multi-hop relay networks in presence of an active eavesdropper with imperfect eavesdropping CSI

  • Original language description

    In this paper, we evaluate system performances of a multi-hop relay protocol with presence of an active eavesdropper. In the proposed protocol, a source attempts to transmit its data to a destination with assistance of multiple intermediate relays. From the eavesdropping Channel State Information (CSI) estimated, the source and relays adjust their transmit power so that the eavesdropper cannot overhear the transmitted data. Moreover, to enhance throughput for the proposed system, Non-Orthogonal Multiple Access (NOMA) technique with a simple power allocation is also proposed. We derive exact closed-form expressions of the Outage Probability (OP) and throughput for the data transmission over Rayleigh fading channel. In addition, when the CSI estimation is imperfect, Intercept Probability (IP) at the eavesdropper is derived. Finally, Monte Carlo simulations are presented to verify the theoretical derivations.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>SC</sub> - Article in a specialist periodical, which is included in the SCOPUS database

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2017

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Advances in Electrical and Electronic Engineering

  • ISSN

    1336-1376

  • e-ISSN

  • Volume of the periodical

    15

  • Issue of the periodical within the volume

    4

  • Country of publishing house

    CZ - CZECH REPUBLIC

  • Number of pages

    7

  • Pages from-to

    591-597

  • UT code for WoS article

  • EID of the result in the Scopus database

    2-s2.0-85037665438