2021
DOI: 10.1109/tvt.2021.3088441
|View full text |Cite
|
Sign up to set email alerts
|

Secure Vehicular Communications Through Reconfigurable Intelligent Surfaces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
59
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 96 publications
(60 citation statements)
references
References 11 publications
1
59
0
Order By: Relevance
“…In (15), ξ e,k is calculated as ξ e,k = hH e,k µ t (µ t ) H he,k . The second term on the right side of ( 13) can be approximately as…”
Section: A Sub-problem For Solving Bf Wmentioning
confidence: 99%
See 1 more Smart Citation
“…In (15), ξ e,k is calculated as ξ e,k = hH e,k µ t (µ t ) H he,k . The second term on the right side of ( 13) can be approximately as…”
Section: A Sub-problem For Solving Bf Wmentioning
confidence: 99%
“…[13], especially for the cell-free networks. Nowadays, the physical layer security (PLS) technique has been adopted to deal with the security issue [14], [15]. Interestingly, the RIS has also showed a good performance in improving the system security, through increasing the signal strength of legitimate users and weakening that of illegal users [16].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, Ai et al [17] demonstrated the potential of improving secrecy with LIS aid under different scenarios where a passive eavesdropper is attempting to retrieve the transmitted information: a vehicular-to-vehicular and a vehicular-to-infrastructure. Makarfi et al [18] showed how the source power, eavesdropper distance, the number of LIS elements, the source-to-relay distance, and the secrecy threshold affect the secrecy capacity and SOP when the vehicular source uses an LIS as an access point.…”
Section: Related Workmentioning
confidence: 99%
“…Cascaded fading models were found feasible to characterize the multi-hop non-regenerative amplify-and-forward (AF) relaying with fixed gain, the propagation in the presence of keyholes, the keyhole/pinhole phenomena in MIMO systems, and the reconfigurable intelligent surface (RIS)-aided wireless systems [ 97 99 ]. Yang et al [ 97 ] modeled the RIS-aided main link as a multiplication of two Rayleigh distributed random variables.…”
Section: Secrecy Characterizationmentioning
confidence: 99%