GLOBECOM 2020 - 2020 IEEE Global Communications Conference 2020
DOI: 10.1109/globecom42002.2020.9322281
|View full text |Cite
|
Sign up to set email alerts
|

Full-Duplex Destination-Aided Jamming Scheme for SWIPT-Enabled Relay Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…e FD destination node with the ability of emitting artificial noise is exploited to achieve better secrecy transmission in the threenode eavesdropping scenario of SWIPT, where the destination employed time-switching (TS) protocol to harvest energy, and the closed-form expressions of the connection outage probability (COP), the secrecy outage probability (SOP), the transmission outage probability (TOP), and the secrecy energy efficiency are derived [21]. In our previous study [22], an FD destination-assisted jamming scheme was adopted in a SWIPT-enabled trusted relay network, and the optimization problem was designed to achieve the optimal secrecy capacity, where only the PS scheme with the linear EH (LEH) model was considered.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…e FD destination node with the ability of emitting artificial noise is exploited to achieve better secrecy transmission in the threenode eavesdropping scenario of SWIPT, where the destination employed time-switching (TS) protocol to harvest energy, and the closed-form expressions of the connection outage probability (COP), the secrecy outage probability (SOP), the transmission outage probability (TOP), and the secrecy energy efficiency are derived [21]. In our previous study [22], an FD destination-assisted jamming scheme was adopted in a SWIPT-enabled trusted relay network, and the optimization problem was designed to achieve the optimal secrecy capacity, where only the PS scheme with the linear EH (LEH) model was considered.…”
Section: Introductionmentioning
confidence: 99%
“…Unlike these papers, the destination sent the jamming signal with FD to protect the classified information in our network, which is the fundamental difference between our and their works. Secondly, only the LEH model was utilized in [19,21,22], while both the linear and nonlinear EH models are considered in this treatise. irdly, the destination node was self-interference in our network, instead of disturbing the relay, which is unlike the network in [19].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations