Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Exploiting Opportunistic Scheduling in Uplink Wiretap Networks

Full metadata record
DC Field Value Language
dc.contributor.authorGe, Xin-
dc.contributor.authorJin, Hu-
dc.contributor.authorZhu, Jun-
dc.contributor.authorCheng, Julian-
dc.contributor.authorLeung, Victor C. M.-
dc.date.accessioned2021-06-22T14:03:30Z-
dc.date.available2021-06-22T14:03:30Z-
dc.date.created2021-01-21-
dc.date.issued2017-06-
dc.identifier.issn0018-9545-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/9581-
dc.description.abstractOpportunistic scheduling schemes are investigated for uplink wiretap channels with multiple asymmetrically located legitimate users (LUs) and eavesdroppers. To exploit multiuser diversity, the cumulative distribution function-based scheduling method is leveraged to schedule the transmissions of the LUs. Under this scheduling framework, the closed-form expressions of the secrecy outage probability and ergodic secrecy rate are derived, illustrating the interplay among the system parameters, such as the channel statistics and the number of LUs and eavesdroppers. Through the secrecy outage analysis of the proposed scheduling schemes, we observe that the secrecy throughput is not always maximized with a larger channel access ratio (CAR), and consequently, we design a CAR adjustment scheme to maximize the secrecy throughput while satisfying the required secrecy level. We also prove that under our proposed scheduling schemes, the secrecy diversity order of each LU is equal to the reciprocal of the LU's CAR, implying that full diversity order is achieved, and the ergodic secrecy rate of each LU normalized by its CAR achieves the optimal double-logarithmic growth when the number of LUs increases to infinity.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleExploiting Opportunistic Scheduling in Uplink Wiretap Networks-
dc.typeArticle-
dc.contributor.affiliatedAuthorJin, Hu-
dc.identifier.doi10.1109/TVT.2016.2616679-
dc.identifier.scopusid2-s2.0-85028334123-
dc.identifier.wosid000404034800031-
dc.identifier.bibliographicCitationIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, v.66, no.6, pp.4886 - 4897-
dc.relation.isPartOfIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY-
dc.citation.titleIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY-
dc.citation.volume66-
dc.citation.number6-
dc.citation.startPage4886-
dc.citation.endPage4897-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalResearchAreaTransportation-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.relation.journalWebOfScienceCategoryTransportation Science & Technology-
dc.subject.keywordPlusPHYSICAL-LAYER SECURITY-
dc.subject.keywordPlusFADING CHANNELS-
dc.subject.keywordPlusWIRELESS INFORMATION-
dc.subject.keywordPlusSECRECY CAPACITY-
dc.subject.keywordPlusTRANSMISSION-
dc.subject.keywordPlusSYSTEMS-
dc.subject.keywordPlusCOMMUNICATION-
dc.subject.keywordAuthorCumulative distribution function (CDF) based scheduling-
dc.subject.keywordAuthorfair resource sharing-
dc.subject.keywordAuthorphysical layer security-
dc.subject.keywordAuthorsecrecy outage probability-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/7588202-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF ENGINEERING SCIENCES > SCHOOL OF ELECTRICAL ENGINEERING > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher JIN, HU photo

JIN, HU
ERICA 공학대학 (SCHOOL OF ELECTRICAL ENGINEERING)
Read more

Altmetrics

Total Views & Downloads

BROWSE