2016
DOI: 10.1049/iet-com.2015.1060
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy performance of dual‐hop decode‐and‐forward relay system with diversity combining at the eavesdropper

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
43
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 24 publications
(43 citation statements)
references
References 41 publications
(82 reference statements)
0
43
0
Order By: Relevance
“…The scenario considered in Zhou et al consists of one source, one destination, one eavesdropper, and one jammer that send interference to the eavesdropper. The predefined signal‐to‐noise ratio (SNR) threshold is taken into account for the relay to be able to decode or not in Ghose et al without the assumption of perfect decoding at the relays . Performances of the maximal ratio combining and selection combining diversity at the eavesdropper were thus evaluated in Ghose et al Kundu et al studied the SOP behaviors with the traditional, optimal, and suboptimal relay selection criteria.…”
Section: Introductionmentioning
confidence: 99%
“…The scenario considered in Zhou et al consists of one source, one destination, one eavesdropper, and one jammer that send interference to the eavesdropper. The predefined signal‐to‐noise ratio (SNR) threshold is taken into account for the relay to be able to decode or not in Ghose et al without the assumption of perfect decoding at the relays . Performances of the maximal ratio combining and selection combining diversity at the eavesdropper were thus evaluated in Ghose et al Kundu et al studied the SOP behaviors with the traditional, optimal, and suboptimal relay selection criteria.…”
Section: Introductionmentioning
confidence: 99%
“…Fan et al observe that the first criterion outperforms the second criterion. Ghose et al consider a scenario in which EAV listens to the source message transmitted from both the transmitter and relay and then eavesdrops the information by employing the maximal ratio combining (MRC) and selection combing (SC) schemes. It is shown that SC scheme performs better than MRC scheme.…”
Section: Introductionmentioning
confidence: 99%
“…In the presence of direct links, both the destination and the eavesdropper have access to two independent versions of the source message and can therefore apply diversity combining techniques. Direct and relayed links are combined at the eavesdropper using maximal ratio combining (MRC) and selection combining (SC) in [22], and MRC in [21], [23], [24]. Diversity combining is performed both at the destination and eavesdropper using MRC technique in [25], [26], [29], [30].…”
Section: Introductionmentioning
confidence: 99%
“…In [32], only ergodic secrecy rate (ESR) is evaluate in the wiretap channel model. Recently, our works in [23], [30] studied effect of CSI knowledge on both the secrecy outage probability (SOP) and ESR in communications using relay. In [23], direct link was not considered from source to destination and [30] only considered a single diversity scheme.…”
Section: Introductionmentioning
confidence: 99%