2019
DOI: 10.1109/comst.2018.2865607
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Of late, the research community is actively working towards exploiting cooperative communication techniques to further improve the security. Many studies are showing that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications, relative to the non-cooperative case. Motivated by the importance of this class of PLS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
98
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 204 publications
(98 citation statements)
references
References 352 publications
0
98
0
Order By: Relevance
“…We first show in Fig. 2 the obtained radar beampatterns with precise and uncertain target angles, which are formulated by solving problem (8) and (9) respectively. We set ∆θ = 5 • and with perfect CSI and precise target location with perfect CSI and target location uncertainty with perfect CSI and precise target location, P 0 =20dBm with perfect CSI and target location uncertainty, P 0 =20dBm Fig.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…We first show in Fig. 2 the obtained radar beampatterns with precise and uncertain target angles, which are formulated by solving problem (8) and (9) respectively. We set ∆θ = 5 • and with perfect CSI and precise target location with perfect CSI and target location uncertainty with perfect CSI and precise target location, P 0 =20dBm with perfect CSI and target location uncertainty, P 0 =20dBm Fig.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…A. Approaches to Problem (8) and (9) In this section, we propose an iterative algorithm to solve the above optimization problems. Initially, it is straightforward to see that (7) is convex, which can be readily solved by use of standard numerical tools, such as CVX.…”
Section: The Proposed Approachmentioning
confidence: 99%
See 2 more Smart Citations
“…However, a large number of hops requires significant signaling and scheduling overhead to determine the most suitable relays, which in turn can lead to increased energy consumption and latency. Also, the potential security issues associated with multi-hop relaying cannot be ignored [19], [20], as the points at which a malicious user can intercept the transmitted signal increase. On the other Fig.…”
Section: Introductionmentioning
confidence: 99%