2014
DOI: 10.1186/1687-1499-2014-109
|View full text |Cite
|
Sign up to set email alerts
|

Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks

Abstract: The recent development of vehicular networking technologies brings the promise of improved driving safety and traffic efficiency. Cooperative communication is recognized as a low-complexity solution for enhancing both the reliability and the throughput of vehicular networks. However, due to the openness of wireless medium, the vehicular wireless communications (VWC) is also vulnerable to potential eavesdropping attacks. To tackle with this issue, we in this paper propose a novel user-cooperation scheme with an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 37 publications
0
9
0
Order By: Relevance
“…, 35(eq. 2.16.8.5) we can obtain  1 ( ) as in (30). Likewise, following the similar steps as used to evaluate (30), we can readily obtain  2 ( ),  3 ( ), and  4 ( ).…”
Section: Proof Of Theoremmentioning
confidence: 93%
See 3 more Smart Citations
“…, 35(eq. 2.16.8.5) we can obtain  1 ( ) as in (30). Likewise, following the similar steps as used to evaluate (30), we can readily obtain  2 ( ),  3 ( ), and  4 ( ).…”
Section: Proof Of Theoremmentioning
confidence: 93%
“…and the terms w k1 ( ), w k1,M ( ),w k1,M ( ), v k1,M ( ),v k1,M ( ), and q k1 ( ) are given in Table 2. Moreover,  2 ( ) can be obtained and represented by replacing the subscript "k1" of w k1 ( ), w k1,M ( ), w k1,M ( ) with "k", and v k1,M ( ) by w k,k1,M ( ), v k1,M ( ) by w k,k1,M ( ), and q k1 ( ) by w k,k1 ( ) in (30)…”
Section: Theorem 1 the Sop  (Ii)mentioning
confidence: 99%
See 2 more Smart Citations
“…In V2V communication, secrecy capacity can be improved by adoption at one relay R between the host vehicle A and the target vehicle B. In a general, secrecy capacity of a cooperative relay communication is higher than that of the direct communication without a relay [25][26][27][28]. For simplicity of the analysis of secrecy capacity, we assume that the system model comprises one relay R between the host vehicle A and the target vehicle B, as shown in Figure 4.…”
Section: Path-related Parameters 41 Relay Communicationmentioning
confidence: 99%