2019
DOI: 10.1109/tcomm.2019.2926719
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Analysis in DF Relay Over Generalized-$K$ Fading Channels

Abstract: In this paper, we analyze the secrecy performance of the decode-and-forward (DF) relay system in generalized-K fading channels. In a typical four-node communications model, a source (S) sends confidential information to a destination (D) via a relay (R) using DF strategy in two time slots, while an eavesdropper (E) wants to overhear the information from S to D over generalized-K fading channels. To be more realistic, we assume that E can receive the signals of two time slots, and there is no direct link betwee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 29 publications
(52 reference statements)
0
6
0
Order By: Relevance
“…PHY-security aspects have been thoroughly investigated in the literature for various network scenarios under different fading channels without considering the cognitive framework [11][12][13][14][15][16][17][18][19][20]. Furthermore, the authors in [21] have proposed a machine-learning-based method to locate the vehicles generating jamming signals by monitoring the physical channel parameters of the vehicles in the vehicular networks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…PHY-security aspects have been thoroughly investigated in the literature for various network scenarios under different fading channels without considering the cognitive framework [11][12][13][14][15][16][17][18][19][20]. Furthermore, the authors in [21] have proposed a machine-learning-based method to locate the vehicles generating jamming signals by monitoring the physical channel parameters of the vehicles in the vehicular networks.…”
Section: Related Workmentioning
confidence: 99%
“…As such, the instantaneous CSI of the eavesdropper can be available at the transmitter via a feedback channel for the time slot where it is being served. Therefore, from this information and assuming eavesdropper CSI does not change under the assumption of quasi-stationary channel for a short duration, statistical CSI of the passive eavesdropper can be available at the trusted node, for the time slots where it is not being served [17][18][19][20][21][22][23][24][25][26][27][28][29][30]. The detail of the interference constraints is discussed later in this section.…”
Section: Cognitive Radio Vehicular Systemmentioning
confidence: 99%
“…By changing its parameters, it can represent many channel models. To account for this, a large section of the literature has studied the transmission performance and security of the generalized fading channels [8][9][10][11][12][13][14][15]. In [8], Lei et al employed two mathematical forms to complete the derivation of the lower limit of SOP and strictly positive secrecy capacity (SPSC).…”
Section: Introductionmentioning
confidence: 99%
“…Elsewhere, the ability of such a channel to resist active eavesdropping was investigated by deriving the ASC in [9]. Using a system model of decode-and-forward (DF) relay cooperation over generalized-K channels, the exact and approximate theoretical expressions of SOP and ESC were evaluated in [10]. Using channels with the premise that the main link follows α-μ distribution and the eavesdropping link was modelled as k-μ distribution, the analytical expressions of ASC, SOP, and SPSC were derived in [11].…”
Section: Introductionmentioning
confidence: 99%
“…[6] derive the SER and outage probability (OP) for decode‐and‐forward (DF) relaying multi‐hop Internet‐of‐Things (IoT) networks over KG fading channels. DF relaying over KG fading channels is considered in [7] to analyse secrecy outage and capacity, and similarly simultaneous wireless information and power transfer (SWIPT) system is investigated for KG fading channels to explore the secrecy OP [8]. Blagojevic and Cvetkovic [9] analyse OP of DF energy harvesting relaying over KG fading channels.…”
Section: Introductionmentioning
confidence: 99%