The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.1049/iet-com.2015.0208
|View full text |Cite
|
Sign up to set email alerts
|

Achievable secrecy rate of wiretap channels incorporating multi‐input–multi‐output amplify and forward relaying

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 45 publications
0
7
0
Order By: Relevance
“…Finally, Fig. 8 compares the result of GRBF method with two related works proposed in [15, 18] which, respectively, study the secrecy rate of multiple single‐input–single‐output relays and single MIMO relay networks with total power constraint at the relay(s). As is illustrated in Fig.…”
Section: Numerical Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Finally, Fig. 8 compares the result of GRBF method with two related works proposed in [15, 18] which, respectively, study the secrecy rate of multiple single‐input–single‐output relays and single MIMO relay networks with total power constraint at the relay(s). As is illustrated in Fig.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…8, the proposed approach yields better performance w.r.t. to the works done in [15, 18] in terms of the secrecy rate as the related search space of the proposed work is carried out over larger dimension.…”
Section: Numerical Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…4The CSI associated with all links are fully known at a central node. This is a common assumption in some related works including [10][11][12][13][17][18][19]. This is a realistic assumption when all nodes are registered nodes of the network.…”
Section: System Modelmentioning
confidence: 98%
“…Recently, many researches have been done on the physical layer security in one-way relay-assisted cooperative networks employing the AF strategy [10][11][12][13]. Also, there have been a tremendous demand to employ two-way bandwidth efficient communication protocols to enhance the spectral efficiency [14].…”
Section: Introductionmentioning
confidence: 99%