International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064



Downloads: 111

M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 4 Issue 2, February 2015


Applying Opportunistic Scheduling On Miso Wiretap Broadcast Channel

Arlin Thomas [2]


secrecy, wiretap, opportunistic beamforming, Rayleigh fading, opportunistic, beamforming, Rayleigh, fading,

Abstract: The problem of broadcasting secret information over wireless links under an secrecy constraint has recently been considered in this paper. The work was among the first to consider the impact of multiuser diversity on secrecy systems and proposed an opportunistic scheme that selects the user with the strongest channel at each time slot. In this work, we study the secrecy implications of opportunistic beamforming for the multiple-input single-output broadcast channel. Two opportunistic scheduling schemes exploiting multiuser diversity are investigated. It requires limited feedback of the effective signal-to-noise ratio (SNR) from the legitimate users. We derive new closed-form expressions for the ergodic secrecy rate with beamforming over which Rayleigh fading is considered for two scheduling schemes. The ergodic secrecy rate for two opportunistic scheduling polices 1) the user with maximal instantaneous channel quality is scheduled for communication, and 2) the proportional fair scheduling (PFS) approach are investigated. Iillustrate the impact of multiuser diversity on the secrecy performance in under information therotic perspective.


Keywords: secrecy, wiretap, opportunistic beamforming, Rayleigh fading


Edition: Volume 4 Issue 2, February 2015,


Pages: 2133 - 2136


How to Cite this Article?

Arlin Thomas, "Applying Opportunistic Scheduling On Miso Wiretap Broadcast Channel", International Journal of Science and Research (IJSR), Volume 4 Issue 2, February 2015, pp. 2133-2136, https://www.ijsr.net/get_abstract.php?paper_id=SUB151729

How to Share this Article?







Similar Articles with Keyword 'secrecy'

Downloads: 104

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1980 - 1987

Implementation of Secured Data Transmission System on Customized Zynq SoC

D. Dhanalaxmi | V. Roopa Reddy

Share this Article

Downloads: 110

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1102 - 1107

Analysis of Stream Ciphers Based on Theoretic Approach

Shisif Pokhrel | Ahmed Abdul Kadhim Basheer [3]

Share this Article


Top