Secrecy Performance of Two-Level Superposition Transmission in Untrusted Multiuser Wireless Downlink Systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Yunsung | - |
dc.contributor.author | Kim, Dongwoo | - |
dc.date.accessioned | 2021-06-22T10:02:20Z | - |
dc.date.available | 2021-06-22T10:02:20Z | - |
dc.date.issued | 2019-06 | - |
dc.identifier.issn | 2162-2337 | - |
dc.identifier.issn | 2162-2345 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/2895 | - |
dc.description.abstract | In an untrusted multiuser downlink system (UTMS) where a desired user is opportunistically selected and all the other users are potential eavesdroppers (Eves), the system performance with security requirement will deteriorate as the number of users grows. In this letter, we have proposed two-level superposition transmission (SuT) in which secure signals are superimposed with ordinary signals that are not necessarily to be secure. The ordinary signals play as jamming signals but are made not decodable at Eves with appropriate power allocation at the sender. We have proved that SuT achieves the full diversity order in secure transmission in UTMS. We also have shown that average secrecy rate with SuT obeys growth rate log logK as the number of users K grows in UTMS. Numerical investigation is used to verify the proof and derivations obtained in this letter. | - |
dc.format.extent | 4 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | IEEE Communications Society | - |
dc.title | Secrecy Performance of Two-Level Superposition Transmission in Untrusted Multiuser Wireless Downlink Systems | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/LWC.2018.2883055 | - |
dc.identifier.scopusid | 2-s2.0-85057428219 | - |
dc.identifier.wosid | 000472579800008 | - |
dc.identifier.bibliographicCitation | IEEE Wireless Communications Letters, v.8, no.3, pp 681 - 684 | - |
dc.citation.title | IEEE Wireless Communications Letters | - |
dc.citation.volume | 8 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 681 | - |
dc.citation.endPage | 684 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordAuthor | Secure outage probability | - |
dc.subject.keywordAuthor | average secrecy rate | - |
dc.subject.keywordAuthor | untrusted multiuser systems | - |
dc.subject.keywordAuthor | superposition transmission | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/8543613 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.