End-to-end performance of transmit antenna selection and generalized selection combining in dual-hop amplify-and-forward relay network in the presence of feedback errors

2012 ◽  
Vol 14 (7) ◽  
pp. 689-703 ◽  
Author(s):  
Ahmet Yılmaz ◽  
Oğuz Kucur
Author(s):  
R. Rajesh ◽  
P. G. S. Velmurugan ◽  
S. J. Thiruvengadam ◽  
P. S. Mallick

In this paper, a bidirectional full-duplex amplify- and-forward (AF) relay network with multiple antennas at source nodes is proposed. Assuming that the channel state information is known at the source nodes, transmit antenna selection and maximal ratio combining (MRC) are employed when source nodes transmit information to the relay node and receive information from the relay node respectively, in order to improve the overall signal-to-interference plus noise ratio (SINR). Analytical expressions are derived for tight upper bound SINR at the relay node and source nodes upon reception. Further, losed form expressions are also derived for end-to-end outage probability of the proposed bidirectional full-duplex AF relay network in the Nakagami-m fading channel environment. Although self-interference at the relay node limits the performance of the full-duplex network, the outage performance of the proposed network is better than that of conventional bidirectional full-duplex and half-duplex AF relay networks, due to the selection diversity gain in TAS and diversity and array gain in MRC.


Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1160 ◽  
Author(s):  
Phu Tin ◽  
Pham Minh Nam ◽  
Tran Trung Duy ◽  
Phuong Tran ◽  
Miroslav Voznak

In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 163594-163607
Author(s):  
Sergey Shaboyan ◽  
Alireza S. Behbahani ◽  
Ahmed M. Eltawil

Sign in / Sign up

Export Citation Format

Share Document