Jammer assisted SEE maximization in decode-and-forward relay network

Kirti Kant Sharma, Ranjan Bose

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In this paper, the energy efficiency of secure communication in a wireless decode-and-forward (DF) relay network is studied using friendly jammer. Our objective is to maximize the secure energy efficiency (SEE), measured as the numbers of bits transmitted secretly per unit of energy consumed under power constraint on each node and target secrecy rate constraint. SEE maximization requires the optimal selection of helper nodes as relays and jammer, and then the power allocation among them. The SEE maximization is achieved by joint power allocation between the source, relays and a jammer in global channel state information (CSI) scenario. In this paper, the optimal jammer and relay set is selected iteratively by a simple jammer and relay selection scheme to avoid mix integer formulation of the optimization problem. The resulting problem is solved by a joint application of fractional programming, exact penalty, alternate search, and difference of convex functions programming.

Original languageEnglish
Title of host publicationSPCOM 2018 - 12th International Conference on Signal Processing and Communications
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages347-351
Number of pages5
ISBN (Electronic)9781538638217
DOIs
StatePublished - Jul 2018
Externally publishedYes
Event12th International Conference on Signal Processing and Communications, SPCOM 2018 - Bangalore, India
Duration: Jul 16 2018Jul 19 2018

Publication series

NameSPCOM 2018 - 12th International Conference on Signal Processing and Communications

Conference

Conference12th International Conference on Signal Processing and Communications, SPCOM 2018
Country/TerritoryIndia
CityBangalore
Period07/16/1807/19/18

Fingerprint

Dive into the research topics of 'Jammer assisted SEE maximization in decode-and-forward relay network'. Together they form a unique fingerprint.

Cite this