All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Security-Reliability Trade-Off Analysis for Rateless Codes-Based Relaying Protocols Using NOMA, Cooperative Jamming and Partial Relay Selection

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F21%3A10248198" target="_blank" >RIV/61989100:27240/21:10248198 - isvavai.cz</a>

  • Result on the web

    <a href="https://ieeexplore.ieee.org/abstract/document/9541369" target="_blank" >https://ieeexplore.ieee.org/abstract/document/9541369</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/ACCESS.2021.3114343" target="_blank" >10.1109/ACCESS.2021.3114343</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Security-Reliability Trade-Off Analysis for Rateless Codes-Based Relaying Protocols Using NOMA, Cooperative Jamming and Partial Relay Selection

  • Original language description

    In this paper, we propose secure relaying transmission protocols using rateless codes, where a source sends encoded packets to two intended destinations via help of intermediate relays. Employing non-orthogonal multiple access, two encoded packets can be sent to the destinations at the same time. In addition, two partial relay selection methods are studied to enhance reliability of the data transmission at the first and second hops. For protecting the source-relay and relay-destination transmission against an eavesdropper, cooperative jamming technique is employed. Particularly, in the first phase of each data transmission cycle, the remaining relays (except the selected relay) are used to transmit artificial noise on the eavesdropper, and cooperate with the selected relay to cancel interference components. In the second phase, trusted nodes that are near the destinations are employed to play a role as the cooperative jammers. For a fair performance comparison, we design a simple transmit power allocation for the transmitter and jammer nodes at the first and second phases. We also propose an adaptive power allocation method, where fractions of the transmit power are appropriately allocated to the signals, relying on instantaneous channel gains between the selected relay and the destinations. This paper also derives exact closed-form formulas of outage probability and intercept probability over Rayleigh fading channel. All the performance analysis is then validated by Monte-Carlo simulations. The obtained results clearly show a trade-off between security and reliability that can be enhanced by optimally designing the system parameters.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

    <a href="/en/project/LM2018140" target="_blank" >LM2018140: e-Infrastructure CZ</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2021

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    IEEE Access

  • ISSN

    2169-3536

  • e-ISSN

  • Volume of the periodical

    9

  • Issue of the periodical within the volume

    September

  • Country of publishing house

    US - UNITED STATES

  • Number of pages

    22

  • Pages from-to

    131087-131108

  • UT code for WoS article

    000701214700001

  • EID of the result in the Scopus database