Optimal power allocation by imperfect hardware analysis in untrusted relaying networks

Ali Kuhestani, Abbas Mohammadi, Kai-Kit Wong, Phee Lep Yeoh, Majid Moradikia, Muhammad R. A. Khandaker

Research output: Contribution to journalArticle

20 Citations (Scopus)
22 Downloads (Pure)

Abstract

By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination, and an untrusted amplify-and-forward relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas' system, while the rest are equipped with a single antenna. To prevent the untrusted relay from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as destination-based cooperative jamming. Given this system model, novel closed-form expressions are presented in the high signal-to-noise ratio regime for the ergodic secrecy rate and the secrecy outage probability. We further improve the secrecy performance of the system by optimizing the associated hardware design. The results reveal that by beneficially distributing the tolerable hardware imperfections across the transmission and reception radio-frequency front ends of each node, the system's secrecy rate may be improved. The engineering insight is that equally sharing the total imperfections at the relay between the transmitter and the receiver provides the best secrecy performance. Numerical results illustrate that the proposed OPA together with the most appropriate hardware design significantly increases the secrecy rate.

Original languageEnglish
Pages (from-to)4302-4314
Number of pages13
JournalIEEE Transactions on Wireless Communications
Volume17
Issue number7
Early online date10 Apr 2018
DOIs
Publication statusPublished - 1 Jul 2018

Keywords

  • hardware design
  • hardware imperfections
  • optimal power allocation
  • Physical layer security
  • untrusted relay

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Optimal power allocation by imperfect hardware analysis in untrusted relaying networks'. Together they form a unique fingerprint.

  • Cite this