2017 IEEE 17th International Conference on Communication Technology (ICCT) 2017
DOI: 10.1109/icct.2017.8359628
|View full text |Cite
|
Sign up to set email alerts
|

Security performance analysis for cooperative communication system under Nakagami-m fading channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…At H, the relay forwards the decoding of the signal to D and E. To improve the antieavesdropping ability, when H transmits information to D and E, the influence of artificial noise is also considered. In the actual communication system, due to the existence of CEEs at D, there will be some artificial noise and residual interference [42][43][44]. In summary, the information at D and E q can be written as 3 Wireless Communications and Mobile Computing where x HD and x HE q represent the actual signals transmitted to D and E q with Efjx HD j 2 g = Efjx HE q j 2 g = 1. x J HD and x J HE q are, respectively, denoted as the signals sent to D and E q with artificial noise.…”
Section: The Second Transfer Processmentioning
confidence: 99%
“…At H, the relay forwards the decoding of the signal to D and E. To improve the antieavesdropping ability, when H transmits information to D and E, the influence of artificial noise is also considered. In the actual communication system, due to the existence of CEEs at D, there will be some artificial noise and residual interference [42][43][44]. In summary, the information at D and E q can be written as 3 Wireless Communications and Mobile Computing where x HD and x HE q represent the actual signals transmitted to D and E q with Efjx HD j 2 g = Efjx HE q j 2 g = 1. x J HD and x J HE q are, respectively, denoted as the signals sent to D and E q with artificial noise.…”
Section: The Second Transfer Processmentioning
confidence: 99%
“…Theorem 5: The exact analytical expressions for IP of colluding eavesdroppers scheme under non-ideal and ideal conditions are provided in (55) and (56), as shown at the bottom of this page, where (50) and (53) into (49), respectively. Firstly, it can be seen that the security of colluding scenario outperform that of non-colluding scenario because of sharing information among eavesdroppers.…”
Section: ) Non-colluding Eavesdroppersmentioning
confidence: 99%
“…into(50), we can further compute the following formula is Similarly, the calculation method and steps of I 1 . After calculation, we can get Q 3 and Q 4 are…”
mentioning
confidence: 99%
“…Substituting (39) into (36), after some manipulations, we can obtain (37). Then, substitute (34) into (36).…”
Section: Asymptotic Analysismentioning
confidence: 99%
“…To improve the secure performance, the R transmits artificial noise signal to D and E n at the same time. In practice, D cannot remove the artificial noise due to the CEEs, and there are some residual interference received at D [37][38][39]. Therefore, the received signals at D and E n can be expressed as:…”
Section: System Modelmentioning
confidence: 99%