4.7 Article

Security-Reliability Trade-Off Analysis for Multiuser SIMO Mixed RF/FSO Relay Networks With Opportunistic User Scheduling

Journal

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Volume 15, Issue 9, Pages 5904-5918

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TWC.2016.2572681

Keywords

Mixed RF/FSO relay network; multiuser diversity; opportunistic user scheduling; Nakagami-m fading; gamma-gamma fading; physical layer security; security-reliability trade-off; cooperative jamming; power allocation

Funding

  1. National Plan for Science, Technology and Innovation (Maarifah) - King Abdulaziz City for Science and Technology - through the Science and Technology Unit at King Fahd University of Petroleum AMP
  2. Minerals (KFUPM) - the Kingdom of Saudi Arabia [15-ELE4157-04]

Ask authors/readers for more resources

In this paper, we study the performance of multiuser single-input multiple-output mixed radio frequency (RF)/free space optical (FSO) relay network with opportunistic user scheduling. The considered system includes multiple users, one amplify-and-forward relay, one destination, and a multiple-antenna eavesdropper. The users are connected with the relay node through RF links and the relay is connected with the destination through an FSO link. Both maximum ratio combining and selection combining schemes are used at the multiple-antenna relay to combine the signal received from the best user on different antennas. The RF/FSO channels models are assumed to follow Nakagami-m/gamma-gamma fading models with pointing errors. Closed-form expressions are derived for the outage probability, average symbol error probability, and ergodic channel capacity. Then, the power of the selected best user is determined to minimize the system asymptotic outage probability under the dominant RF or FSO link. Then, the considered system secrecy performance is investigated, where the closed-form expressions for the intercept probability are derived. Finally, we propose a new cooperative jamming model in which the worst user is selected by the authorized system to jam the existing eavesdropper. Monte-Carlo simulations are provided to validate the achieved exact and asymptotic results.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available