The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.1007/s11277-016-3754-2
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Capacity of Two-Hop Relay Assisted Wiretap Channels

Abstract: Incorporating the physical layer characteristics to secure communications has received considerable attention in recent years. Moreover, cooperation with some nodes of network can give benefits of multiple-antenna systems, increasing the secrecy capacity of such channels. In this paper, we consider cooperative wiretap channel with the help of an Amplify and Forward (AF) relay to transmit confidential messages from source to legitimate receiver in the presence of an eavesdropper. In this regard, the secrecy cap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 39 publications
0
5
0
Order By: Relevance
“…In Figure , ESR in terms of ρ in WJ scenario is evaluated for OPA and non‐OPA modes in the first phase for topologies T1 and T2, and for untrusted relays and trusted relays. In this figure, the untrusted relay scenario in this paper is compared with the trusted relay mentioned in other works . It is assumed that in the second phase, OPA has been done for ξ = ξ * .…”
Section: Numerical Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…In Figure , ESR in terms of ρ in WJ scenario is evaluated for OPA and non‐OPA modes in the first phase for topologies T1 and T2, and for untrusted relays and trusted relays. In this figure, the untrusted relay scenario in this paper is compared with the trusted relay mentioned in other works . It is assumed that in the second phase, OPA has been done for ξ = ξ * .…”
Section: Numerical Resultsmentioning
confidence: 99%
“…In this figure, the untrusted relay scenario in this paper is compared with the trusted relay mentioned in other works. [4][5][6][7][8][9][10][11][12][13] It is assumed that in the second phase, OPA has been done for ξ = ξ * . Simulation results show that ESR in T1 for OPA mode is totally consistent with trusted relay mode since in this mode, the relay plays no role in providing a D2D connection and acts only as an eavesdropper.…”
Section: Figurementioning
confidence: 99%
See 3 more Smart Citations