Effect of RF Interference on the Security-Reliability Trade-off Analysis of Multiuser Mixed RF/FSO Relay Networks with Power Allocation

Ahmed H. Abd El-Malek, Anas Salhab, Salam Zummo, Mohamed-Slim Alouini

Research output: Contribution to journalArticlepeer-review

67 Scopus citations

Abstract

In this paper, the impact of radio frequency (RF) cochannel interference (CCI) on the performance of multiuser mixed RF/free-space optical (FSO) relay network with opportunistic user scheduling under eavesdropping attack is studied. The considered system includes multiple users, one decode-and-forward relay, one destination, and an eavesdropper. In the analysis, the RF/FSO channels follow Nakagami-m/Gamma-Gamma fading models, respectively, with pointing errors on the FSO link. Exact closed-form expression for the system outage probability is derived. Then, an asymptotic expression for the outage probability is obtained at the high signal-to-interference-plus-noise ratio regime to get more insights on the system performance. Moreover, the obtained results are used to find the optimal transmission power in different turbulence conditions. The secrecy performance is studied in the presence of CCI at both the authorized relay and eavesdropper, where closed-form expressions are derived for the intercept probability. The physical layer security performance is enhanced using cooperative jamming models, where new closed-form expressions are derived for the intercept probability. Another power allocation optimization problem is formulated to find the optimal transmission and jamming powers. The derived analytical formulas are supported by numerical results to clarify the main contributions of this paper.
Original languageEnglish (US)
Pages (from-to)1490-1505
Number of pages16
JournalJournal of Lightwave Technology
Volume35
Issue number9
DOIs
StatePublished - Mar 27 2017

Fingerprint

Dive into the research topics of 'Effect of RF Interference on the Security-Reliability Trade-off Analysis of Multiuser Mixed RF/FSO Relay Networks with Power Allocation'. Together they form a unique fingerprint.

Cite this