2021 IEEE International Conference on Communications Workshops (ICC Workshops) 2021
DOI: 10.1109/iccworkshops50388.2021.9473617
|View full text |Cite
|
Sign up to set email alerts
|

Relay-Assisted Secure Short-Packet Communications in Cognitive Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…Later, Chen and others expanded their previous security works to cognitive relaying networks [15,16]. The relay design in previous works [15,16] exploits the maximum ratio combining/zero forcing beamforming scheme to guarantee the secrecy performance of dual-hop short-packet communications. In the underlay cognitive relaying network of Ho and others [17], secondary-source and secondary-energy-harvesting relays send short packets to a secondary destination under interference constraints.…”
Section: Related Work and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…Later, Chen and others expanded their previous security works to cognitive relaying networks [15,16]. The relay design in previous works [15,16] exploits the maximum ratio combining/zero forcing beamforming scheme to guarantee the secrecy performance of dual-hop short-packet communications. In the underlay cognitive relaying network of Ho and others [17], secondary-source and secondary-energy-harvesting relays send short packets to a secondary destination under interference constraints.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Their proposed protocol lowers the latency and improves the reliability from those of the benchmark scheme (long packet communications created in the same model settings). However, previous works [14][15][16][17][18][19] have ignored the emerging IRS.…”
Section: Related Work and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…By inserting (18) and (19) to Proposition 3, the closed-form expression for the asymptotic BLER at the kth hop is obtained as εS,Far…”
Section: A Fixed Tolerable Interference Power Constraintmentioning
confidence: 99%
“…Meanwhile, [18] performed the decoding error rate evaluation, optimal blocklength, and optimal RL allocation for the unmanned aerial vehicle-based DF three-hop relay IoT networks. In [19], the secrecy throughput of dual-hop relaying CR SPC IoT networks was analyzed under the constraints of secrecy and the decoding error probability, where the DF relay utilizes either the MRC or zero-forcing beamforming scheme. [20] investigated TAS/MRC and TAS/selectioncombining (SC) MIMO systems with SPCs to gain the advantages of connectivity, SE, and uRLLCs.…”
mentioning
confidence: 99%