Analysis of system outage probability in underlay cognitive two-way amplify-and-forward relay networks

2020 ◽  
Vol 160 ◽  
pp. 253-262 ◽  
Author(s):  
Raed T. Al-Zubi ◽  
Mohannad T. Abu Issa ◽  
Ahmad A. Zghoul ◽  
Khalid A. Darabkh ◽  
Yazid M. Khattabi
2014 ◽  
Vol 543-547 ◽  
pp. 2243-2248
Author(s):  
Min Li ◽  
Hong Zhou ◽  
Qin Fei Huang

The outage probability (OP) of dual-hop fixed-gain amplify-and-forward (AF) relay over Rayleigh fading channels is analyzed when the feedback delay, the estimation error and the multiple co-channel interferences (CCI) are all present. A closed-form expression for the OP is derived and validated by Monte Carlo simulations with several scenarios considered, also the impacts of feedback delay, estimation error and CCI have been shown in the numerical results.


2018 ◽  
Vol 67 (12) ◽  
pp. 12373-12378 ◽  
Author(s):  
Lisheng Fan ◽  
Nan Zhao ◽  
Xianfu Lei ◽  
Qingchun Chen ◽  
Nan Yang ◽  
...  

2012 ◽  
Vol 1 (4) ◽  
pp. 296-299 ◽  
Author(s):  
Mao Yan ◽  
Qingchun Chen ◽  
Xianfu Lei ◽  
Trung Q. Duong ◽  
Pingzhi Fan

2018 ◽  
Vol 14 (1) ◽  
pp. 155014771875472 ◽  
Author(s):  
Dechuan Chen ◽  
Weiwei Yang ◽  
Jianwei Hu ◽  
Weifeng Mou ◽  
Yueming Cai

We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential information from the source. The secrecy outage probability and connection outage probability are respectively derived in closed-form to evaluate the security and reliability for three energy harvesting strategies, for example, time switching relaying strategy, power splitting relaying strategy, and ideal relaying receiver strategy. Subsequently, the effective secrecy throughput is conducted to characterize the overall efficiency, and the asymptotic analysis of the secrecy throughput is given to determine the optimal energy harvesting strategies in different operating regimes. Furthermore, in order to achieve the optimal effective secrecy throughput performance, a switching threshold between time switching relaying and power splitting relaying is designed. Numerical results verify the accuracy of the analytical expressions and reveal that the effective secrecy throughput of the system can be effectively promoted by the threshold switching energy harvesting strategy.


Sign in / Sign up

Export Citation Format

Share Document