2017
DOI: 10.1049/iet-com.2016.0355
|View full text |Cite
|
Sign up to set email alerts
|

Improving physical layer security in untrusted relay networks: cooperative jamming and power allocation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
48
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 50 publications
(48 citation statements)
references
References 32 publications
(58 reference statements)
0
48
0
Order By: Relevance
“…After this cancellation, the ESC and SOP have been found out. In He and Yener's study, and in previous studies, the authors demonstrate the performance of network considering the untrusted relays. In previous studies ) and Lv, Chen, Yang, and Kuo's study, signals are sent by nodes using a fixed power budget.…”
Section: Introductionmentioning
confidence: 75%
See 3 more Smart Citations
“…After this cancellation, the ESC and SOP have been found out. In He and Yener's study, and in previous studies, the authors demonstrate the performance of network considering the untrusted relays. In previous studies ) and Lv, Chen, Yang, and Kuo's study, signals are sent by nodes using a fixed power budget.…”
Section: Introductionmentioning
confidence: 75%
“…The authors observe that as the number of untrusted relays increases, performance in terms of secrecy outage probability (SOP) decreases as in Sun, Zhang, Li, and Niu's study. 12 In Kalamkar and Banerjee's study, 14 DBJ has been used to protect the confidential message from untrusted relay, whereas in Lv, Chen, Yang, and Kuo's study, 15 source-based jamming (SBJ) has been applied to deteriorate the SINR at the untrusted relay. In Kalamkar and Banerjee's study, 14 when the source sends the information signal to the untrusted relay, the destination sends a jamming signal to the untrusted relay at the same time slot.…”
Section: Untrusted Relay Destination-and-source Based Jamming and Pmentioning
confidence: 99%
See 2 more Smart Citations
“…In [27], a new closed-form solution was derived to determine the optimal power allocation (OPA) between the base station and mobile user with friendly jamming in two-way untrusted relay networks. In [29], the power allocation for multi-relay nodes was studied. In [28], the power allocation and locations of confidential and jamming signals were analyzed in detail in terms of network security performance.…”
Section: Introductionmentioning
confidence: 99%