scispace - formally typeset
Search or ask a question
Author

Lisheng Fan

Bio: Lisheng Fan is an academic researcher from Guangzhou University. The author has contributed to research in topics: Relay & Computer science. The author has an hindex of 29, co-authored 111 publications receiving 2517 citations. Previous affiliations of Lisheng Fan include Southwest Jiaotong University & Shantou University.


Papers
More filters
Journal ArticleDOI
TL;DR: It is demonstrated that the all selection criteria achieve full secrecy diversity order N, while the proposed two criteria in this paper outperform the conventional max-min scheme.
Abstract: We investigate the impact of cochannel interference on the security performance of multiple amplify-and-forward (AF) relaying networks, where $N$ intermediate AF relays assist the data transmission from the source to the destination. The relays are corrupted by multiple cochannel interferers, and the information transmitted from the relays to the destination can be overheard by the eavesdropper. In order to deal with the interference and wiretap, the best out of $N$ relays is selected for security enhancement. To this end, we derive a novel lower bound on the secrecy outage probability (SOP), which is then utilized to present two best relay selection criteria, based on the instantaneous and statistical channel information of the interfering links. For these criteria and the conventional max–min criterion, we quantify the impact of cochannel interference and relay selection by deriving the lower bound on the SOP. Furthermore, we derive the asymptotic SOP for each criterion, to explicitly reveal the impact of transmit power allocation among interferers on the secrecy performance, which offers valuable insights into practical design. We demonstrate that the all selection criteria achieve full secrecy diversity order $N$ , while the proposed two criteria in this paper outperform the conventional max–min scheme.

206 citations

Journal ArticleDOI
TL;DR: An analyticalexpression for the secrecy outage probability (SOP) is derived and the asymptotic expression for the SOP in the high main-to-eavesdropper ratio regime is derived in order to study the impact of both channel correlation and outdated relay selection on the secrecy performance.
Abstract: In this paper, we study the impact of correlated fading on the secrecy performance of multiple decode-and-forward (DF) relaying with outdated relay selection. It is assumed that the information transmission, assisted by $N$ DF relays from the source to the destination, can be overheard by an eavesdropper. Particularly, we consider the realistic scenario where the eavesdropper's and the main channels are correlated. In order to enhance the network security, the best relay is selected among $N$ available DF relays to assist the secure transmission. Due to the time-varying channel environments, we note that the selected relay may be outdated. In order to study the impact of both channel correlation and outdated relay selection on the secrecy performance, we first derive an analytical expression for the secrecy outage probability (SOP). Also, we derive the asymptotic expression for the SOP in the high main-to-eavesdropper ratio regime. Numerical results are provided to demonstrate the correctness of our analytical expressions.

194 citations

Journal ArticleDOI
TL;DR: This paper quantifies the impact of correlated fading on secure communication of multiple amplify-and-forward (AF) relaying networks and concludes that the channel correlation is always beneficial to the secrecy performance of full relay selection, however, it deteriorates the confidentiality performance if partial-relay selection is used.
Abstract: This paper quantifies the impact of correlated fading on secure communication of multiple amplify-and-forward (AF) relaying networks. In such a network, the base station (BS) is equipped with multiple antennas and communicates with the destination through multiple AF relays, while the message from the relays can be overheard by an eavesdropper. We focus on the practical communication scenario, where the main and eavesdropper’s channels are correlated. In order to enhance the transmission security, transmit antenna selection is performed at the BS, and the best relay is chosen according to the full- or partial-relay selection criterion, which relies on the dual-hop relay channels or the second-hop relay channels, respectively. For these criteria, we study the impact of correlated fading on the network secrecy performance, by deriving an analytical approximation for the secrecy outage probability and an asymptotic expression for the high main-to-eavesdropper ratio. From these results, it is concluded that the channel correlation is always beneficial to the secrecy performance of full relay selection. However, it deteriorates the secrecy performance if partial-relay selection is used, when the number of antennas at the BS is less than the number of relays.

153 citations

Journal ArticleDOI
TL;DR: A 5G-based green broadband communication system with simultaneous wireless information and power transfer (SWIPT) is proposed to combine WIT and WPT, and the simulation results have shown the outstanding performance of the designed system.

135 citations

Journal ArticleDOI
TL;DR: This paper proposes relay selection to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward relays, in the presence of multiple eavesdroppers, with three criteria to select the best relay and user pair to strengthen the network security against eavesdropping attack.
Abstract: This paper proposes relay selection to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward relays, in the presence of multiple eavesdroppers. To strengthen the network security against eavesdropping attack, we present three criteria to select the best relay and user pair. Specifically, criteria I and II study the received signal-to-noise ratio (SNR) at the receivers, and perform the selection by maximizing the SNR ratio of the user to the eavesdroppers. To this end, criterion I relies on both the main and eavesdropper links, while criterion II relies on the main links only. Criterion III is the standard max-min selection criterion, which maximizes the minimum of the dual-hop channel gains of main links. For the three selection criteria, we examine the system secrecy performance by deriving the analytical expressions for the secrecy outage probability. We also derive the asymptotic analysis for the secrecy outage probability with high main-to-eavesdropper ratio. From the asymptotic analysis, an interesting observation is reached: for each criterion, the system diversity order is equivalent to the number of relays regardless of the number of users and eavesdroppers.

131 citations


Cited by
More filters
Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

01 Jan 2016
TL;DR: The table of integrals series and products is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can get it instantly.
Abstract: Thank you very much for downloading table of integrals series and products. Maybe you have knowledge that, people have look hundreds times for their chosen books like this table of integrals series and products, but end up in harmful downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they cope with some harmful virus inside their laptop. table of integrals series and products is available in our book collection an online access to it is set as public so you can get it instantly. Our book servers saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the table of integrals series and products is universally compatible with any devices to read.

4,085 citations

Journal ArticleDOI
TL;DR: The wireless backhaul traffic in two typical network architectures adopting small cell and millimeter wave communication technologies is analyzed and the energy efficiency of wirelessBackhaul networks is compared for different network architectures and frequency bands.
Abstract: 5G networks are expected to achieve gigabit-level throughput in future cellular networks. However, it is a great challenge to treat 5G wireless backhaul traffic in an effective way. In this article, we analyze the wireless backhaul traffic in two typical network architectures adopting small cell and millimeter wave communication technologies. Furthermore, the energy efficiency of wireless backhaul networks is compared for different network architectures and frequency bands. Numerical comparison results provide some guidelines for deploying future 5G wireless backhaul networks in economical and highly energy-efficient ways.

597 citations

Journal ArticleDOI
TL;DR: The simulation results show that the proposed algorithm can effectively improve the system utility and computation time, especially for the scenario where the MEC servers fail to meet demands due to insufficient computation resources.
Abstract: Computation offloading services provide required computing resources for vehicles with computation-intensive tasks. Past computation offloading research mainly focused on mobile edge computing (MEC) or cloud computing, separately. This paper presents a collaborative approach based on MEC and cloud computing that offloads services to automobiles in vehicular networks. A cloud-MEC collaborative computation offloading problem is formulated through jointly optimizing computation offloading decision and computation resource allocation. Since the problem is non-convex and NP-hard, we propose a collaborative computation offloading and resource allocation optimization (CCORAO) scheme, and design a distributed computation offloading and resource allocation algorithm for CCORAO scheme that achieves the optimal solution. The simulation results show that the proposed algorithm can effectively improve the system utility and computation time, especially for the scenario where the MEC servers fail to meet demands due to insufficient computation resources.

543 citations

Journal ArticleDOI
TL;DR: A detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks is provided.
Abstract: As a complement to high-layer encryption techniques, physical layer security has been widely recognized as a promising way to enhance wireless security by exploiting the characteristics of wireless channels, including fading, noise, and interference. In order to enhance the received signal power at legitimate receivers and impair the received signal quality at eavesdroppers simultaneously, multiple-antenna techniques have been proposed for physical layer security to improve secrecy performance via exploiting spatial degrees of freedom. This paper provides a comprehensive survey on various multiple-antenna techniques in physical layer security, with an emphasis on transmit beamforming designs for multiple-antenna nodes. Specifically, we provide a detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks. Finally, future research directions and challenges are identified.

416 citations