Energy efficiency in fading relay channels under secrecy and QoS constraints

Mustafa Ozmen, Chuang Ye, M. Cenk Gursoy, Senem VelIPasalar

Research output: Chapter in Book/Entry/PoemConference contribution

Abstract

Transmission over a half-duplex relay channel with secrecy and quality-of-service (QoS) constraints is studied. It is assumed that data is stored in buffers prior to transmission and transmitters operate with a constraint on the buffer overflow probability. Using the effective capacity formulation, secrecy throughput is derived for the half duplex two-hop fading relay system operating in the presence of an eavesdropper. The scenario without security considerations is also addressed. For both scenarios, minimum energy per bit is obtained. The impact of QoS exponents and channel correlation on the throughput is investigated via numerical analysis. Taking into account the path loss effect, the effect of the relay and eavesdropper locations on the throughput and energy efficiency is studied in a simple linear network.

Original languageEnglish (US)
Title of host publication2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication, PIMRC 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages150-154
Number of pages5
ISBN (Electronic)9781479949120
DOIs
StatePublished - Jun 25 2014
Event2014 25th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communication, IEEE PIMRC 2014 - Washington, United States
Duration: Sep 2 2014Sep 5 2014

Publication series

NameIEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
Volume2014-June

Other

Other2014 25th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communication, IEEE PIMRC 2014
Country/TerritoryUnited States
CityWashington
Period9/2/149/5/14

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Energy efficiency in fading relay channels under secrecy and QoS constraints'. Together they form a unique fingerprint.

Cite this