2012
DOI: 10.1049/iet-com.2011.0319
|View full text |Cite
|
Sign up to set email alerts
|

Link adaptation for physical layer security over wireless fading channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(26 citation statements)
references
References 15 publications
0
26
0
Order By: Relevance
“…For example, LA has been proposed as a tool to improve physical layer security in wireless links [36]. Additionally, link adaptation to maximize energy efficiency has been proposed for wireless body area networks (WBAN) [37].…”
Section: Prior Workmentioning
confidence: 99%
“…For example, LA has been proposed as a tool to improve physical layer security in wireless links [36]. Additionally, link adaptation to maximize energy efficiency has been proposed for wireless body area networks (WBAN) [37].…”
Section: Prior Workmentioning
confidence: 99%
“…Next, we use the results within Algorithm 1, which yields the optimum TM n and choice of cooperating relays M C in presence of the constraint C2 in (10). In fact, Algorithm 1 identifies the largest TM n (rate) for which the set of cooperating relays leading to maximum γ eq in subproblem (11) satisfies C2 in (10).…”
Section: A Exact Solutionmentioning
confidence: 99%
“…To this end, design of sharp punctured LDPC codes for which the bit error rate (BER) curve falls sharply from high BERs to very low BERs (steep waterfall region), is considered in [10]. Yet, adaptive transmission may be exploited to enhance the system performance over time-varying channels both in terms of security and reliability [11].…”
Section: Introductionmentioning
confidence: 99%
“…In [2][3][4], physicallayer security (PLS) was further analyzed for Gaussian channels, broadcast channels, and wireless fading channels, respectively. A secure link adaptation for PLS was proposed in [5], which improved the communication performance in the presence of eavesdropper. In [6], the authors presented the relay selection scheme for PLS in cognitive radio networks which was analyzed in many cases such as in one and multiple eavesdropper nodes, in one or multiple primary users.…”
Section: Introductionmentioning
confidence: 99%