On the Multi-User Diversity with Secrecy in Uplink Wiretap Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jin, Hu | - |
dc.contributor.author | Shin, Won-Yong | - |
dc.contributor.author | Jung, Bang Chul | - |
dc.date.accessioned | 2021-06-23T02:43:25Z | - |
dc.date.available | 2021-06-23T02:43:25Z | - |
dc.date.created | 2021-01-21 | - |
dc.date.issued | 2013-09 | - |
dc.identifier.issn | 1089-7798 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/27130 | - |
dc.description.abstract | In this letter, we consider the uplink wiretap network which consists of a base station, N legitimate users, and several eavesdroppers. We propose a novel user scheduling algorithm based on a threshold, which achieves the optimal multi-user diversity gain, i.e., log log N. To the best of our knowledge, there has been no such result in uplink wiretap networks. In order to obtain good throughput performance in the network, the threshold value needs to be carefully chosen. Through extensive simulations, we observe that the proposed user scheduling outperforms the conventional scheduling algorithms and it approaches the throughput performance of the optimal user scheduling algorithm in various scenarios. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | On the Multi-User Diversity with Secrecy in Uplink Wiretap Networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Jin, Hu | - |
dc.identifier.doi | 10.1109/LCOMM.2013.071813.131158 | - |
dc.identifier.scopusid | 2-s2.0-84884821360 | - |
dc.identifier.wosid | 000324931900026 | - |
dc.identifier.bibliographicCitation | IEEE COMMUNICATIONS LETTERS, v.17, no.9, pp.1778 - 1781 | - |
dc.relation.isPartOf | IEEE COMMUNICATIONS LETTERS | - |
dc.citation.title | IEEE COMMUNICATIONS LETTERS | - |
dc.citation.volume | 17 | - |
dc.citation.number | 9 | - |
dc.citation.startPage | 1778 | - |
dc.citation.endPage | 1781 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | FADING CHANNELS | - |
dc.subject.keywordPlus | TAP CHANNEL | - |
dc.subject.keywordPlus | COMMUNICATION | - |
dc.subject.keywordPlus | CAPACITY | - |
dc.subject.keywordAuthor | Physical-layer security | - |
dc.subject.keywordAuthor | secrecy capacity | - |
dc.subject.keywordAuthor | throughput scaling | - |
dc.subject.keywordAuthor | multi-user diversity | - |
dc.subject.keywordAuthor | user scheduling | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/6574302/ | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.