JOURNAL ARTICLE

Adaptive resource allocation for secure two-hop communication

Abstract

This paper develops novel transmission schemes to support secure dual-hop Alice-Ray-Bob relaying communication in the presence of a passive eavesdropper (Eve). Due to unknown eavesdropper channel conditions, data transmissions from Alice (to Ray) and from Ray (to Bob) are required to satisfy the secrecy constraint in terms of maximum acceptable secrecy outage probability (SOP). The throughput maximization problem is studied for two scenarios: 1) fixed (Alice and Ray) power allocation; and 2) adaptive power allocation. The resulting constrained optimization problems are solved using the Lagrangian approach. In each frame, either Alice or Ray or neither can be scheduled for transmission depending on the instantaneous main channel conditions. Numerical results demonstrate the effectiveness of the proposed schemes over the existing schemes under various secrecy constraint and signal-to-noise power ratio (SNR) regimes.

Keywords:
Computer science Secrecy Maximization Wireless Artificial noise Resource allocation Transmission (telecommunications) Mathematical optimization Channel (broadcasting) Secure communication Computer network Constraint (computer-aided design) Telecommunications Transmitter Mathematics Encryption Computer security

Metrics

3
Cited By
0.37
FWCI (Field Weighted Citation Impact)
15
Refs
0.62
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Wireless Communication Security Techniques
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Cooperative Communication and Network Coding
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Wireless Communication Technologies
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
© 2026 ScienceGate Book Chapters — All rights reserved.