2018
DOI: 10.1109/lwc.2017.2756885
|View full text |Cite
|
Sign up to set email alerts
|

Impact of Relay’s Eavesdropping on Untrusted Amplify-and-Forward Networks Over Nakagami- $m$ Fading

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
12
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…PHY-security, due to its appealing advantages, has been widely investigated in the literature ( [7][8][9][10][11][12][13][14][15] and the references therein). However, all these works are limited to the scenario, where nodes in the network are stationary and the channel between them is modelled as either classical Rayleigh fading [7][8][9][10][11][12] or Nakagami-m fading [13][14][15], whereas, vehicular networks involve vehicle-to-vehicle (V2V) links (i.e. when both transmitter and receiver are in motion), and the channel between two mobile nodes can be modelled as cascaded Rayleigh or cascaded Nakagami-m fading, since it can appropriately capture the probabilistic channel effects [16,17].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…PHY-security, due to its appealing advantages, has been widely investigated in the literature ( [7][8][9][10][11][12][13][14][15] and the references therein). However, all these works are limited to the scenario, where nodes in the network are stationary and the channel between them is modelled as either classical Rayleigh fading [7][8][9][10][11][12] or Nakagami-m fading [13][14][15], whereas, vehicular networks involve vehicle-to-vehicle (V2V) links (i.e. when both transmitter and receiver are in motion), and the channel between two mobile nodes can be modelled as cascaded Rayleigh or cascaded Nakagami-m fading, since it can appropriately capture the probabilistic channel effects [16,17].…”
Section: Introductionmentioning
confidence: 99%
“…The relay location and power allocation optimisation problems are widely investigated in the literature (see [30][31][32][33] and the references therein), without considering PHY-security aspects. Under PHY-security, the optimal power allocation problem has been extensively studied for cooperative relaying networks [12,13,[34][35][36][37]. Specifically, the authors of [12,13,34,35] studied the power allocation optimisation problem for cooperative relaying networks under an untrusted relay scenario.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…He et al introduced the cooperative jamming technique into an untrusted network with N source‐destination pairs and presented user‐pair selection schemes. For Nakagami‐ m fading, the impact of eavesdropping on SOP performance for AF relaying with an untrusted relay was investigated in Ding et al…”
Section: Introductionmentioning
confidence: 99%
“…He et al 21 introduced the cooperative jamming technique into an untrusted network with N source-destination pairs and presented user-pair selection schemes. For Nakagami-m fading, the impact of eavesdropping on SOP performance for AF relaying with an untrusted relay was investigated in Ding et al 22 Comparisons with the existing literatures about the PRS schemes are emphasized in Table 1. Different from the previous literatures in two-hop relay selection scheme 8,9,12,16 and conventional PRS scheme, 10,16 this paper focuses on how to design an efficient PRS scheme to achieve the better secrecy performance, while reducing the feedback overhead over two-hop relay selection criterion.…”
Section: Introductionmentioning
confidence: 99%