2018
DOI: 10.1109/jiot.2018.2830880
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Wireless-Powered Relaying Schemes With Cooperative Jamming for Two-Hop Secure Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
22
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 47 publications
(22 citation statements)
references
References 25 publications
0
22
0
Order By: Relevance
“…To proceed, we substitute (14) into (15). Then, by applying the variable transformation, γ = 1 exp u ð Þ− 1 , and after some mathematical manipulations, (15) can be rewritten as follows:…”
Section: Statistics Of the End-to-end Snrmentioning
confidence: 99%
See 1 more Smart Citation
“…To proceed, we substitute (14) into (15). Then, by applying the variable transformation, γ = 1 exp u ð Þ− 1 , and after some mathematical manipulations, (15) can be rewritten as follows:…”
Section: Statistics Of the End-to-end Snrmentioning
confidence: 99%
“…7 Generally, the relays can either operate in DF [8][9][10][11] or AF mode on the basis intensity of received signals. [12][13][14] Within the context of DF relaying, relays can also decode their received signals, remodulate them, and then transmit to the subsequent nodes. 15 Where, based on the relaying strategy adopted, different cooperative protocols can be implemented to achieve target performance criteria, defined in terms of error probability, outage probability, 16 and ergodic capacity.…”
mentioning
confidence: 99%
“…F UTURE wireless networks such as the beyond fifth generation 5G (B5G) system or Internet of Things (IoT) system aim at supporting the rapidly increasing number of mobile devices and data traffic while reducing the network energy consumption compared to the fourth generation (4G) networks [1]. The B5G system will essentially help to establish the IoT as an indispensable part of our lives by setting up the foundation for unleashing its full potential [2], [3]. To achieve this goal, energy-efficient ultra-dense networks (UDNs) have been widely regarded as one of the most promising solutions for the future wireless networks [4]- [6].…”
Section: Introductionmentioning
confidence: 99%
“…The secrecy capacity and the secrecy outage probability were researched in [29], where the source with the highest gain was selected to transmit information. Destinationbased cooperative interference schemes for both PSR and TSR protocols were investigated, where the destination splits a portion of power for information transmission, while the rest for power transfer [30].…”
Section: Introductionmentioning
confidence: 99%
“…Different from [28], the relay can harvest energy from both source and destination. In [29,30], residual self-interference was not considered.…”
Section: Introductionmentioning
confidence: 99%