This paper investigates physical layer security with opportunistic scheduling in a downlink wireless network with multiple asymmetrically located legitimate users (LUs) and eavesdroppers. We employ the cumulative distribution function (CDF)-based scheduling policy to guarantee fairness among LUs in arbitrary fading channels while exploiting multiuser diversity. Under this scheduling framework, the closed-form expressions for the secrecy throughput and secrecy outage probability are derived, illustrating the interplay among the system parameters such as the channel statistics and the number of LUs and eavesdroppers. In order to investigate the exploited multiuser diversity gain, the normalized secrecy throughput, i.e., the secrecy throughput...
We analyze the secrecy outage probability in the downlink for wireless networks with spatially (Pois...
In this paper, we investigate the physical-layer security of a multi-user multi-eavesdropper cogniti...
International audienceWe analyze the secrecy outage probability in the downlink for wireless network...
Opportunistic scheduling schemes are investigated for uplink wiretap channels with multiple asymmetr...
In this paper, we propose a novel user scheduling that achieves the optimal multi-user diversity gai...
This paper studies the physical-layer security of a multi-user multi-eavesdropper cellular network, ...
In this letter, we consider the uplink wiretap network which consists of a base station, N legitimat...
In this paper, we investigate secure communication for a dual-hop multiuser relay network, where a s...
In this paper, we investigate secure communication for a dual-hop multiuser relay network, where a s...
peer reviewedIn this letter, we employ orthogonal random beamforming (ORBF) for the worst-case multi...
To meet the growing demand of mobile data service with limited radio resources, wireless networks ha...
AbstractThis paper studies the physical-layer security of a multi-user multi-eavesdropper cellular n...
Performance of opportunistic scheduling for physical layer security with transmit antenna selection ...
In this paper, we address the opportunistic scheduling in multitwo user NOMA system consisting of on...
We analyze the secrecy outage probability in the downlink for wireless networks with spatially (Pois...
We analyze the secrecy outage probability in the downlink for wireless networks with spatially (Pois...
In this paper, we investigate the physical-layer security of a multi-user multi-eavesdropper cogniti...
International audienceWe analyze the secrecy outage probability in the downlink for wireless network...
Opportunistic scheduling schemes are investigated for uplink wiretap channels with multiple asymmetr...
In this paper, we propose a novel user scheduling that achieves the optimal multi-user diversity gai...
This paper studies the physical-layer security of a multi-user multi-eavesdropper cellular network, ...
In this letter, we consider the uplink wiretap network which consists of a base station, N legitimat...
In this paper, we investigate secure communication for a dual-hop multiuser relay network, where a s...
In this paper, we investigate secure communication for a dual-hop multiuser relay network, where a s...
peer reviewedIn this letter, we employ orthogonal random beamforming (ORBF) for the worst-case multi...
To meet the growing demand of mobile data service with limited radio resources, wireless networks ha...
AbstractThis paper studies the physical-layer security of a multi-user multi-eavesdropper cellular n...
Performance of opportunistic scheduling for physical layer security with transmit antenna selection ...
In this paper, we address the opportunistic scheduling in multitwo user NOMA system consisting of on...
We analyze the secrecy outage probability in the downlink for wireless networks with spatially (Pois...
We analyze the secrecy outage probability in the downlink for wireless networks with spatially (Pois...
In this paper, we investigate the physical-layer security of a multi-user multi-eavesdropper cogniti...
International audienceWe analyze the secrecy outage probability in the downlink for wireless network...