2018
DOI: 10.5755/j01.eie.24.4.21483
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Secure Performance of Full-Duplex Decode and Forward in Optimal Relay Selection Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Due to the symmetry of the proposed system model in Figure 1, without loss of generality, assume that S n and S f are near and far sources from the relays, respectively, where n, f ∈ f1, 2g and n ≠ f . Applying the SIC technique [5,6,24,27,32], firstly, the relays decode the signal x n of the nearby source which has better average channel quality while the signal x f is considered as interference. The received signal-to-interference-plus-noise ratio (SINR) for detecting x n is given by…”
Section: System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Due to the symmetry of the proposed system model in Figure 1, without loss of generality, assume that S n and S f are near and far sources from the relays, respectively, where n, f ∈ f1, 2g and n ≠ f . Applying the SIC technique [5,6,24,27,32], firstly, the relays decode the signal x n of the nearby source which has better average channel quality while the signal x f is considered as interference. The received signal-to-interference-plus-noise ratio (SINR) for detecting x n is given by…”
Section: System Modelmentioning
confidence: 99%
“…When γ ⟶ +∞, we obtain asymptotic expression as where ϕ 6 = ðγ t ðα n λ n + α f λ f Þð1 − ρ 2 ÞÞ/α n and ϕ 7 = ðγ t ðα n λ n + α f λ f Þð1 − ρ 2 ÞÞ/α f : Remark 5. In the SIC-3TS protocol, the outage probabilities and the asymptotic expressions of the sources S f and S n are also identified as closed-form formulas ( 19), ( 23), (24), and (25), respectively. OP S f γ⟶+∞…”
Section: Op S N D N ≤Dmentioning
confidence: 99%
See 1 more Smart Citation
“…Regarding physical layer security, it is considered as one of the promising paradigm related to fields of information security and wireless communications as it can realize the secrecy communication by utilizing the untrusted nature of relay without any encryption algorithm. Such NOMA also needs secure consideration as other emerging networks . In fact, in some cases, the relays themselves may not be worth trusting.…”
Section: Introductionmentioning
confidence: 99%
“…[14][15][16] Such NOMA also needs secure consideration as other emerging networks. 17 In fact, in some cases, the relays themselves may not be worth trusting. In real systems, these untrusted relays still help the system in information transmission.…”
mentioning
confidence: 99%