Security-Reliability Trade-Off Analysis for Multiuser SIMO Mixed RF/FSO Relay Networks With Opportunistic User Scheduling

Citation data:

IEEE Transactions on Wireless Communications, ISSN: 1536-1276, Vol: 15, Issue: 9, Page: 5904-5918

Publication Year:
Usage 19
Abstract Views 13
Link-outs 6
Captures 12
Readers 11
Exports-Saves 1
Citations 10
Citation Indexes 10
Repository URL:
El-Malek, Ahmed H. Abd; Salhab, Anas M.; Zummo, Salam A.; Alouini, Mohamed-Slim
Institute of Electrical and Electronics Engineers (IEEE)
Computer Science; Mathematics; Engineering; Mixed RF/FSO relay network; multiuser diversity; opportunistic user scheduling; Nakagami-m fading; gamma-gamma fading; physical layer security; security-reliability trade-off; cooperative jamming; power allocation
article description
In this paper, we study the performance of multiuser single-input multiple-output mixed radio frequency (RF)/free space optical (FSO) relay network with opportunistic user scheduling. The considered system includes multiple users, one amplify-and-forward relay, one destination, and a multiple-antenna eavesdropper. The users are connected with the relay node through RF links and the relay is connected with the destination through an FSO link. Both maximum ratio combining and selection combining schemes are used at the multiple-antenna relay to combine the signal received from the best user on different antennas. The RF/FSO channels models are assumed to follow Nakagami- m/gamma-gamma fading models with pointing errors. Closed-form expressions are derived for the outage probability, average symbol error probability, and ergodic channel capacity. Then, the power of the selected best user is determined to minimize the system asymptotic outage probability under the dominant RF or FSO link. Then, the considered system secrecy performance is investigated, where the closed-form expressions for the intercept probability are derived. Finally, we propose a new cooperative jamming model in which the worst user is selected by the authorized system to jam the existing eavesdropper. Monte-Carlo simulations are provided to validate the achieved exact and asymptotic results.