- Research
- Open Access

# Performance of opportunistic scheduling for physical layer security with transmit antenna selection

- Anish Prasad Shrestha
^{1}and - Kyung Sup Kwak
^{1}Email author

**2014**:33

https://doi.org/10.1186/1687-1499-2014-33

© Shrestha and Kwak; licensee Springer. 2014

**Received:**8 July 2013**Accepted:**27 January 2014**Published:**4 March 2014

## Abstract

We introduce an opportunistic scheduling to enhance the physical layer security with transmit antenna selection (TAS) in multiuser environment. We consider a wireless communication system composed of a single transmitter and multiple legitimate users in the presence of several eavesdroppers with each node having multiple antennas under quasi-static Rayleigh fading channel. The transmitter selects the best transmitting antenna and the best user to maximize signal-to-noise ratio (SNR) at the selected user. The user and eavesdropper can employ either selection combining (SC) or maximal ratio combining (MRC) to combine the received signals. New closed-form expressions for probability of positive secrecy and outage are derived. Moreover, asymptotic analysis reveals the outage diversity gain and array gain for the proposed scheme. The impact of number of users, eavesdroppers, and antennas on secrecy performance are clearly demonstrated with mathematical analysis and numerical results.

## Keywords

- Opportunistic scheduling
- Transmit antenna selection
- Maximal ratio combining
- Selection combining
- Secrecy outage probability

## 1 Introduction

The security risks are inherent in any wireless network due to its underlying transmission medium, the airwave, which is exposed to all sorts of unwanted eavesdroppers. Traditionally, cryptographic algorithms are applied at the upper layer to secure information. However, physical layer (PHY) security has recently gained considerable attention as an alternative option to secure information besides the traditional cryptographic schemes. It can exploit the uncorrelated nature of the wireless medium for enhancing the security of wireless systems. The pioneering work in [1] presented that a noisy communication channel offers opportunities for non-zero rate secure communication when the eavesdroppers’ channel is on average a degraded version of the main channel. This work was further extended in [2] to characterize the non-degraded channel. The perfect secrecy capacity was defined in [3] as the difference between the capacity of main channel and wiretap channel given that the capacity of the former is greater than the latter one under Gaussian channel. The secrecy capacity will provide the highest value of communication rate for which coding schemes can be designed ensuring the perfect secrecy. Moreover, the existence of the perfect secrecy in wiretap channels was shown in [4] even when the eavesdropper has a better average signal-to-noise ratio (SNR) than the legitimate receiver.

Several aspects of wireless communication field have been studied to improve physical layer security, such as cooperative networks [5, 6], multiaccess channel [7], outdated channel state information (CSI) [8, 9], channel estimation [10], and cognitive radio [11]. In recent years, usage of diversity has emerged as a common technique to enhance PHY security. Several papers exist in literature [12-19] which employ either transmit or receive diversity to improve PHY security. In [12], the receive diversity technique was studied where both legitimate user and eavesdropper employ maximal ratio combining (MRC). The authors showed that the use of multiple receive antennas can enhance security and that the secrecy outage probability is a function of the ratio between the number of receive antennas at user and eavesdropper. Further new results were provided for MRC technique under correlated channels in [13]. The comparison between selection combining (SC) and MRC at eavesdropper was studied in [14]. The authors illustrated that MRC at eavesdropper severely degrades the performance compared to SC at eavesdropper. Beamforming technique is studied in [15] for minimizing the transmit power to a prespecified signal-to-interference-plus-noise-ratio (SINR) at the receiver. However, it should be noted that the transmission side can be highly complex as well as the cost may rise with the increase in the number of antennas. To overcome such issues, transmit antenna selection (TAS) has been proposed in [16-19] which also exploits transmit diversity at the expense of a generally acceptable loss in performance. It uses a single radio frequency (RF) chain instead of several parallel RF sections, which reduces cost, complexity, power consumption, and size.

In [16], performance of TAS was examined in the presence of single receiver and eavesdropper both equipped with single antenna. The authors further extended the work in [17] to a scenario consisting of a sophisticated multiple antenna eavesdropper employing MRC. In [18], use of TAS for security enhancement was examined where the receiver and eavesdropper can employ either MRC or SC under Nakagami-*m* fading channels. The superiority of MRC over SC was established by the authors. Performance of TAS with antenna correlation at the receiver and eavesdropper has been studied in [19]. The authors demonstrated that when the average SNR of the main channel is at medium and high levels, higher correlation at the receiver exerts more detrimental effects on secrecy than higher correlation at the eavesdropper. Opportunistic scheduling policy for PHY security has been discussed in [20], but the authors have addressed only MAC layer policies.

In this paper, we consider a single transmitter with multiple active users and several passive eavesdroppers each equipped with multiple antennas in contrast to [16-18] and [20]. We propose an opportunistic scheduling along with TAS at transmitter. A similar case with single eavesdropper is analyzed in [21]. However, we extend the work in [21] to the case of multiple non-colluding eavesdroppers and receivers which can employ either MRC or SC. MRC may be employed to maximize the SNR as it is an optimum combining technique, while SC may be employed for its simplicity. As different users experience different channel environments at a given moment, an opportunistic scheduling can maximize the transmission data rate with an exactly known CSI of all users [22]. With such multiuser diversity, opportunistic scheduling can be a promising technique to improve PHY security where the secrecy capacity is severely limited by SNR of eavesdroppers. In addition, use of TAS with MRC or SC further improves the performance with transmit diversity and receive diversity, respectively. Overall, the proposed scheme allows simultaneous exploitation of multiuser diversity, transmit diversity, and receive diversity.

*Notation* The superscript ^{T} denotes transposition; *E*{·} denotes statistical expectation; **I**_{
N
} is the *N*×*N* identity matrix; ∥**x**∥ denotes the norm of a complex valued vector **x**, i.e., $\sqrt{{\mathbf{x}}^{H}\mathbf{x}}$; $\mathcal{C}\mathcal{N}(\mu ,{\sigma}^{2})$ denotes the complex Gaussian distribution with mean *μ* and variance *σ*^{2}; *P*(*x*) denotes the probability of an event *x*.

## 2 Proposed scheme

### 2.1 System model

*K*as the number of users and

*W*as the number of eavesdroppers as shown in Figure 1. Alice is equipped with

*L*

_{A}antennas while each legitimate user and eavesdropper are equipped with

*L*

_{B}and

*L*

_{E}antennas, respectively. We assume all channels are quasi-static Rayleigh fading. We also assume that there exists a feedback channel between each legitimate user and the transmitter. At the legitimate receiver side, each user selects the best transmit antenna having the highest channel SNR. Each user feedbacks the selected antenna index to Alice. The scheduler at Alice finally selects a single user with corresponding indexed antenna having highest SNR values out of

*K*users. We refer the single selected user as Bob. On the other hand, we consider that Alice possesses only average SNR and no other information about the channel state of eavesdroppers. Moreover, all the channels are considered to be mutually independent. From the eavesdroppers’s point of view, the opportunistically selected single best user along with optimum TAS scheme appears to be a random strategy, as the main channel between Bob and Alice and the wiretap channel between eavesdroppers and Alice are uncorrelated. We need to consider the eavesdropper with maximum possible SNR link for our analysis as it denotes the maximal information leakage. We refer the eavesdropper with maximum SNR as Eve from herein.

The message block *S* is encoded into the codeword **c**=[ *c*(1),..,*c*(*i*),..,*c*(*n*)]. The codeword is designed in such a way that it is suitable to be transmitted over the selected channel. We focus on measuring the achievable level of secrecy rather than the actual code design. The channel is assumed to be power limited in the sense that $\frac{1}{n}{\Sigma}_{i=1}^{n}E\left\{\left|c\right(i){|}^{2}\right\}=P$ where *P* is the average transmit signal power [13].

where *h*_{
E
} is a complex channel coefficient and *n*_{
E
} is additive white Gaussian noise (AWGN) with noise variance ${\sigma}_{E}^{2}$. From (3), the instantaneous SNR of Eve is given by ${\gamma}_{\mathrm{E}}^{\text{MRC/SC}}=\frac{|{h}_{E}{|}^{2}P}{{\sigma}_{E}^{2}}$.

where *g*_{
B
} is a complex channel coefficient and *n*_{
B
} is AWGN with noise variance ${\sigma}_{B}^{2}$. The instantaneous SNR of Bob with SC is given by ${\gamma}_{B}^{\mathit{\text{SC}}}=\frac{|{g}_{B}{|}^{2}P}{{\sigma}_{B}^{2}}$.

where ${\mathbf{\text{g}}}_{E,v}={[{g}_{E,1},{g}_{E,2},\mathrm{...},{g}_{E,{L}_{\mathrm{E}}}]}^{\mathrm{T}}$ is a complex channel vector and ${\mathbf{\text{n}}}_{E,v}\sim \mathcal{C}\mathcal{N}(0,{\sigma}_{E}^{2}{\mathbf{I}}_{{L}_{\mathrm{E}}})$. From (5), the instantaneous SNR of Eve for this scheme is given by ${\gamma}_{\mathrm{E}}^{\text{SC/MRC}}=\frac{\parallel {g}_{E,v}{\parallel}^{2}P}{{\sigma}_{E}^{2}}$.

where *g*_{
E
} is a complex channel coefficient and *n*_{
E
} is AWGN with noise variance ${\sigma}_{E}^{2}$. From (6), the instantaneous SNR of Eve with SC/SC is given by ${\gamma}_{\mathrm{E}}^{\text{SC/SC}}=\frac{|{g}_{E}{|}^{2}P}{{\sigma}_{E}^{2}}$.

### 2.2 SNR distribution

*k*th user employing MRC with

*L*

_{B}antennas can be expressed in the form of Chi-square distribution and Gamma function [23] respectively as

where *Γ*(·) and *Γ*(·,·) are complete and incomplete gamma functions, respectively (Equations (8.339.1) and (8.352.2) in [24]).

*a*

_{ i }denotes the coefficient of ${\left(\frac{{\gamma}_{B}}{{\stackrel{\u0304}{\gamma}}_{B}}\right)}^{i}$ in the expansion of ${\left\{\sum _{i=0}^{({L}_{\mathrm{B}}-1)}\frac{1}{i!}{\left(\frac{{\gamma}_{B}}{{\stackrel{\u0304}{\gamma}}_{B}}\right)}^{i}\right\}}^{m}$, where

*a*

_{ i }can be recursively calculated by

The expressions in (9) and (10) can be obtained by using binomial expansion at first which results the term with power series raised to power ${\left\{\sum _{i=0}^{({L}_{\mathrm{B}}-1)}\frac{1}{i!}{\left(\frac{{\gamma}_{B}}{{\stackrel{\u0304}{\gamma}}_{B}}\right)}^{i}\right\}}^{m}$. The power series can be further expanded by using Equation 0.314 in [24]. This finite series expansion is possible as the first term within incomplete gamma function in (8), i.e., the number of antennas at Bob *L*_{B} has always integer value [26].

*W*number of eavesdroppers in the network each equipped with

*L*

_{E}antennas, the diversity for Eve limits to multiuser diversity and receive diversity while there is no transmit diversity. The PDF and CDF for Eve employing MRC irrespective of MRC or SC at Bob can be obtained using similar order statistics and mathematical steps as in (9) and (10) by replacing

*K*

*L*

_{A}=

*W*and

*L*

_{B}=

*L*

_{E}, respectively which is shown below:

where *b*_{
j
} is the coefficient of ${\left(\frac{{\gamma}_{E}}{{\stackrel{\u0304}{\gamma}}_{E}}\right)}^{j}$ in the expansion of ${\left[\sum _{j=0}^{{L}_{\mathrm{E}}-1}\frac{1}{j!}{\left(\frac{{\gamma}_{E}}{{\stackrel{\u0304}{\gamma}}_{E}}\right)}^{j}\right]}^{p}$, $\beta =\left(\frac{p+1}{{\stackrel{\u0304}{\gamma}}_{E}}\right)$; and ${\stackrel{\u0304}{\gamma}}_{E}$ is average SNR of the eavesdroppers’ channel. We note that the coefficient *b*_{
j
} can be recursively calculated as *a*_{
i
} described in (11).

### 2.3 Secrecy capacity

where *γ*_{
B
} and *γ*_{
E
} are the instantaneous SNR of Bob and Eve, respectively, regardless of any receive diversity scheme.

## 3 Performance metrics

### 3.1 Positive secrecy probability

*f*

_{ B }(·) and

*F*

_{ E }(·) are the PDF and CDF of

*γ*

_{ B }and

*γ*

_{ E }, respectively. As we have already derived the PDF of

*γ*

_{ B }and CDF of

*γ*

_{ E }for respective schemes in Section 2.2, the probability of positive secrecy for each scheme can be easily derived by simply substituting the values and using Equation 3.351.3 in [24] as shown in (22) to (25):

### 3.2 Secrecy outage probability

*R*

_{s}such that

*R*

_{s}>0. The transmission rate below

*R*

_{s}cannot ensure the secure transmission. The outage can occur in two ways: firstly, when SNR at Eve exceeds to that of Bob and Eve is able to decode the message; secondly, when SNR at Bob exceeds to that of Eve but still Bob is unable to decode the message. As such, we can formulate the secrecy outage probability [18, 19] using the total probability theorem as follows:

*γ*

_{ B }≤

*γ*

_{ E }and we always assume that

*R*

_{s}>0, we get

*P*(

*C*

_{s}<

*R*

_{s}|

*γ*

_{ B }≤

*γ*

_{ E })=1. Therefore, (26) becomes

*d*= ${2}^{{R}_{\mathrm{s}}}$. The second term in (27) can be simplified as

*F*

_{ B }(·) is the CDF of

*γ*

_{ B }and

*f*

_{ E }(·) is the PDF of

*γ*

_{ E }. As we have already derived the CDF of

*γ*

_{ B }and PDF of

*γ*

_{ E }for respective schemes, we simply proceed to obtain the outage probability expression for each scheme by replacing the respective values in (30). New closed-form expression of the exact secrecy outage probability for each scheme is provided from (31) to (34) as follows:

####
**Remark**
**1**

By substituting *K*=*W*=*L*_{A}=*L*_{B}=*L*_{E}=1 in (31) to (34), all the schemes reduce to the special case of single transmitter, user, and eavesdropper with single antenna which corresponds to Equation 9 in [4].

**Remark** **2**.

A special case of single transmitter and user with single antenna and an eavesdropper with multiple antennas can be obtained with *K*=*W*=*L*_{A}=*L*_{B}=1 in (31) to (34) such that (31) and (33) corresponds to Equation 10 in [14] while (32) and (34) corresponds to Equation 11 in [14].

This verifies that the expression derived is consistent with the results from the existing literature.

### 3.3 Asymptotic behavior

Although the closed-form expression for the outage probability derived in (31) to (34) enable us to evaluate the performance of TAS scheme, its complex forms do not allow us to gain valuable insights on how the parameter *K*, *W*, *L*_{A}, *L*_{B}, and *L*_{E} affect the overall performance. Therefore, we perform asymptotic analysis in the sequel.

*Δ*=

*K*

*L*

_{A}

*L*

_{B}and array gain

*Ψ*

^{MRC/MRC}is given by

#### Proof

Further discussion of proof of (35) is presented in Appendix 1.

*Δ*=

*K*

*L*

_{A}

*L*

_{B}and array gain

*Ψ*

^{MRC/SC}is given by

*Δ*=

*K*

*L*

_{A}

*L*

_{B}and array gain

*Ψ*

^{SC/MRC}is given by

#### Proof

Further discussion of proof of (37) is presented in Appendix 2.

*Δ*=

*K*

*L*

_{A}

*L*

_{B}and array gain

*Ψ*

^{SC/SC}is given by

It is obvious that MRC/MRC is superior to SC/MRC and MRC/SC is superior to SC/SC by an SNR gap of $\frac{10}{{L}_{\mathrm{B}}}log\left({L}_{\mathrm{B}}!\right)$. Moreover, as ${\stackrel{\u0304}{\gamma}}_{E}\to \infty $, the outage probability becomes one resulting absolute absence of secret communication. Also, the outage probability becomes 0 and 1 at the extreme values of *R*_{s}=0 and *R*_{s}→*∞* respectively as per our expectation.

## 4 Numerical results

*K*= 4,

*W*= 3, and

*L*

_{A}=

*L*

_{B}=

*L*

_{E}= 2. This figure highlights that the probability of positive secrecy increases with ${\stackrel{\u0304}{\gamma}}_{B}$ while decreases with the increase in value of ${\stackrel{\u0304}{\gamma}}_{E}$. In both cases, non-zero secrecy capacity exists even when Eve’s channel has a higher average SNR relative to Bob’s channel. It is also obvious that MRC at Bob and SC at Eve provides the best performance while SC at Bob and MRC at Eve results the worst performance of all four possible schemes.

*L*

_{A}with

*K*=

*W*=

*L*

_{B}=

*L*

_{E}=2, ${\stackrel{\u0304}{\gamma}}_{E}$ = 15 dB and

*R*

_{s}= 0.1 bit/s/Hz. There is a remarkable decrease in the secrecy outage probability when we increase

*L*

_{A}from 1 to 4. This shows the improvement in performance from transmit diversity provided by TAS at Alice. For example, at

*P*

_{out}=10

^{-3}under MRC/MRC scheme, a gain of nearly 5.5 dB is achieved with

*L*

_{A}=4 compared to that of

*L*

_{A}=1.

*K*=

*W*=

*L*

_{A}=

*L*

_{B}=

*L*

_{E}= 2, and

*R*

_{s}= 0.1 bit/s/Hz for this case. We can observe that the asymptotic curve merges with exact curve in the high SNR regime. Moreover, the parallel asymptotic lines indicate the same diversity order in all four schemes. For the case of

*K*=

*L*

_{A}=

*L*

_{B}= 2, the diversity order is found to be nearly 8 in all four schemes, which verifies the diversity order obtained in (35), (37), (39), and (41).

*L*

_{B}and

*L*

_{E}with

*K*=

*W*=

*L*

_{A}=2, ${\stackrel{\u0304}{\gamma}}_{E}$ = 10 dB and

*R*

_{s}= 0.1 bit/s/Hz under MRC/MRC scheme. It is found that for fixed value of

*L*

_{B}, the increase in

*L*

_{E}will increase

*P*

_{out}(

*R*

_{s}). However, there is no improvement in the diversity order which is evident from the parallel lines for different values of

*L*

_{E}. To compensate the performance degradation by number of antennas at Eve, we can increase the number of antennas at Bob. We can notice that a single addition of antenna at Bob sharply decreases the secrecy outage probability.

*R*

_{ s }for different values of

*K*with

*W*=

*L*

_{A}=

*L*

_{B}=

*L*

_{E}=2, ${\stackrel{\u0304}{\gamma}}_{B}$ = 10 dB and ${\stackrel{\u0304}{\gamma}}_{E}$ = 0 dB. For

*K*=1, the proposed scheme corresponds to the scheme discussed in [16] and [17] but with the presence of multiple eavesdroppers. It is clear that employing opportunistic scheduling drastically improves the outage performance and higher target secrecy rate can be achieved. The performance improves with increase in

*K*but it nearly saturates at higher values of

*K*.

## 5 Conclusions

We proposed an opportunistic scheduling with TAS to enhance physical layer security. At the transmitter, a single antenna is selected to maximize the instantaneous SNR of the main channel, while at the receiver and the eavesdropper, MRC or SC is applied. The scheduler at Alice selects a single best user out of *K* users. The security performance metrics, i.e., probability of positive secrecy and secrecy outage probability are improved by combination of transmit diversity, receive diversity, and multiuser diversity simultaneously. The asymptotic analysis demonstrated that the outage diversity order of the proposed scheme is given by the product of the number of legitimate receivers and the number of antennas at the transmitter and receiver. We can also conclude that the secrecy outage probability is almost independent of the number of antennas and eavesdroppers in high SNR region.

## Appendix 1

### Proof of (35)

where
denotes higher-order terms such that $f\left(x\right)=\mathcal{O}\left(g\right(x\left)\right)$ implies that there exists a non-negative constant *τ* so that $\underset{x\to \infty}{lim}\frac{f\left(x\right)}{g\left(x\right)}\le \tau $. We select only the first order terms in (44) and finally substitute (15) and (44) in (30) to obtain (35).

## Appendix 2

### Proof of (37)

Neglecting higher terms in (45) and substituting (15) and (45) in (30), we can obtain (37).

## Declarations

### Acknowledgements

This research was supported by a grant (12-TI-C01) from Advanced Water Management Research Program funded by Ministry of Land, Infrastructure and Transport of the Korean government.

## Authors’ Affiliations

## References

- Wyner AD: The wire-tap channel.
*Bell Syst. Techn. J*1975, 54: 1355-1387.MathSciNetView ArticleGoogle Scholar - Csiszár I, Körner J: Broadcast channels with confidential messages.
*IEEE Trans. Inf. Theory*1978, 24(3):339-348. 10.1109/TIT.1978.1055892View ArticleGoogle Scholar - Leung-Yan-Cheong S, Hellman M: The Gaussian wire-tap channel.
*IEEE Trans. Inf. Theory*1978, 24(4):451-456. 10.1109/TIT.1978.1055917MathSciNetView ArticleGoogle Scholar - Bloch M, Barros J, Rodrigues MRD, McLaughlin SW: Wireless information-theoretic security.
*IEEE Trans. Inf. Theory*2008, 54(6):2515-2534.MathSciNetView ArticleGoogle Scholar - Awan Z, Zaidi A, Vandendorpe L: Secure communication over parallel relay channel.
*IEEE Trans. on Info. Forensics Secur*2012, 7(2):359-371.View ArticleGoogle Scholar - Zou Y, Wang X, Shen W: Optimal relay selection for physical-layer security in cooperative wireless networks.
*IEEE J. Sel. Areas Commun*2013, 31(10):2099-2111.View ArticleGoogle Scholar - Awan Z, Zaidi A, Vandendorpe L: Multiaccess channel with partially cooperating encoders and security constraints.
*IEEE Trans. on Inf. Forensics Secur*2013, 8(7):1243-1254.View ArticleGoogle Scholar - Zaidi A, Awan ZH, Shamai S, Vandendorpe L: Secure degrees of freedom of MIMO X-channels with output feedback and delayed CSI.
*IEEE Trans. Inf. Forensics Secur*2013, 8(11):1760-17774.View ArticleGoogle Scholar - Ferdinand NS, da Costa DB, Latva-aho M: Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection.
*IEEE Commun. Lett, in press*2013, 17(5):864-867.View ArticleGoogle Scholar - Shrestha AP, Kwak KS: On maximal ratio diversity with weighting errors for physical layer security.
*IEEE Commun. Lett, in press.*http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06746738 - Zou Y, Wang X, Shen W: Physical-layer security enhancement with multiuser scheduling in cognitive radio.
*IEEE Trans. Commun, in press*http://arxiv.org/pdf/1311.0404.pdf - He F, Man H, Wang W: Maximal ratio diversity combining enhanced security.
*IEEE Commun. Lett*2011, 15(5):509-511.View ArticleGoogle Scholar - Sarkar MZI, Ratnarajah T: Enhancing security in correlated channel with maximal ratio combining diversity.
*IEEE Trans. on Signal Process*2012, 60(12):6745-6751.MathSciNetView ArticleGoogle Scholar - Prabhu VU, Rodrigues MRD: On wireless channels with m-antenna eavesdroppers: characterization of the outage probability and
*ε*-outage secrecy capacity.*IEEE Trans. Inf. Forensics Secur*2011, 6(3):853-860.View ArticleGoogle Scholar - Mukherjee A, Swindlehurst AL: Robust beamforming for security in MIMO wiretap channels with imperfect CSI.
*IEEE Trans. Signal Process*2011, 59(1):351-361.MathSciNetView ArticleGoogle Scholar - Alves H, Souza RD, Debbah M: Enhanced physical layer security through transmit antenna selection. In
*IEEE GlobeCOM Workshops (GC Wkshps), Texas, 5–9 December 2011*. Houston, Tx; 2011:879-883.View ArticleGoogle Scholar - Alves H, Souza RD, Debbah M, Bennis M: Performance of transmit antenna selection physical layer security schemes.
*IEEE Signal Process. Lett*2012, 19(6):372-375.View ArticleGoogle Scholar - Yang N, Yeoh PL, Elkashlan M, Schober R, Collings IB: Transmit antenna selection for security enhancement in MIMO wiretap channels.
*IEEE Trans. on Commun*2013, 61(1):144-154.View ArticleGoogle Scholar - Yang N, Suraweera HA, Collings IB, Yuen C: Physical layer security of TAS/MRC with antenna correlation.
*IEEE Trans. Inf. Forensics Secur*2013, 8(1):254-259.View ArticleGoogle Scholar - Sun D, Benaboud H, Noufissa M, Li J: Exploring opportunistic scheduling in ad-hoc network with physical layer security.
*2012 National Days of Network Security and Systems (JNS2), Marrakech, 20–21 April 2012*62-67.View ArticleGoogle Scholar - Shrestha AP, Kwak KS: Secure opportunistic scheduling with transmit antenna selection. In
*IEEE 24th International Symposium on Personal Indoor and Mobile Radio Communications PIMRC’13, London, 8–11 September 2013*. London; 2013:461-465.View ArticleGoogle Scholar - Cho H, Andrews JG: Resource-redistributive opportunistic scheduling for wireless systems.
*IEEE Trans. Wireless Commun*2009, 8(7):3510-3522.View ArticleGoogle Scholar - Goldsmith A:
*Wireless Communications*. New York: Cambridge University; 2005.View ArticleGoogle Scholar - Gradshteyn IS, Ryzhik IM:
*Table of Integrals, Series, and Products*. New York: Academic; 2007.Google Scholar - David HA, Nagaraja HN:
*Order Statistics*. Hoboken: Wiley; 2005.Google Scholar - Chen CJ, Wang LC: A unified capacity analysis for wireless systems with joint multiuser scheduling and antenna diversity in Nakagami fading channels.
*IEEE Trans. on Commun*2006, 54(3):469-478.View ArticleGoogle Scholar

## Copyright

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.