2018
DOI: 10.1109/access.2018.2794739
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Rate Optimization in Wireless Multi-Hop Full Duplex Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 26 publications
0
16
0
2
Order By: Relevance
“…A similar mechanism of stopping eavesdropping is also carried out by Wang et al [11], where game theory logic has been used. The work carried out by Tian et al [12] has used a crosslayer based scheme to construct a secrecy model for better data security using an optimization approach. The work carried out by Huang et al [13] has used a conventional mechanism of intrusion detection system considering mobility factor over sensory application.…”
Section: Related Workmentioning
confidence: 99%
“…A similar mechanism of stopping eavesdropping is also carried out by Wang et al [11], where game theory logic has been used. The work carried out by Tian et al [12] has used a crosslayer based scheme to construct a secrecy model for better data security using an optimization approach. The work carried out by Huang et al [13] has used a conventional mechanism of intrusion detection system considering mobility factor over sensory application.…”
Section: Related Workmentioning
confidence: 99%
“…The study of Tayebi et al [32] have presented improved chaotic based direct sequence spread spectrum (DSSS) technique in order to enhance the security of chaotic-DSSS dependent WSN. Tian et al [33] have presented a modified version of mixed integer and nonlinear programming and gave a joint approach of full duplex and security by considering cross-layer optimization to improve the energy utilization, spectrum efficiency and to enhance the security level. The work of Hajji et al [34] have introduced a novel multiobjective secure routing protocol for optimizing overall network resource in order to get quality aware data processing, network reliability and maximum life-span of WSN.…”
Section: A the Backgroundmentioning
confidence: 99%
“…Recently, numerous studies have analyzed PLS performance in the context of dual-and multi-hop relaying systems [18]- [20], [27]- [30]. More specifically, the ergodic secrecy capacity performance in a dual-hop multiple-antenna amplify-and-forward (AF) relaying system was analyzed in [18].…”
Section: Introductionmentioning
confidence: 99%
“…Likewise, the impact of correlated Rayleigh fading on the security of multiple AF relaying networks was quantified in [31], whereas the performance of SOP in a dual-hop DF relaying system with diversity combining at the eavesdropper was considered in [32]. In [27], the authors jointly considered full-duplex and physical layer security by formulating a cross-layer optimization problem to maximize the secrecy rate in a multi-hop wireless network. The performance of PLS in DF full-duplex multi-hop relaying systems was investigated in [28], whereas the performance of PLS of a multi-hop DF relay network was analyzed in [29] in the presence of multiple passive eavesdroppers over Nakagami-m fading channels.…”
Section: Introductionmentioning
confidence: 99%