2016
DOI: 10.1109/twc.2016.2610418
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks

Abstract: This paper studies secrecy transmission with the aid of a group of wireless energy harvesting (WEH)-enabled amplify-and-forward (AF) relays performing cooperative jamming (CJ) and relaying. The source node in the network does simultaneous wireless information and power transfer (SWIPT) with each relay employing a power splitting (PS) receiver in the first phase; each relay further divides its harvested power for forwarding the received signal and generating artificial noise (AN) for jamming the eavesdroppers i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
8
1
1

Relationship

2
8

Authors

Journals

citations
Cited by 72 publications
(42 citation statements)
references
References 44 publications
(88 reference statements)
0
42
0
Order By: Relevance
“…With all the above transformations, (13) can be reformulated as a solvable convex one. Furthermore, to reduce the computational complexity, the problem (13) is rewritten as a second-order cone programming (SOCP) problem [44], [45], which can be expressed as (26) at the top of the next page.…”
Section: B Approximate Transformationsmentioning
confidence: 99%
“…With all the above transformations, (13) can be reformulated as a solvable convex one. Furthermore, to reduce the computational complexity, the problem (13) is rewritten as a second-order cone programming (SOCP) problem [44], [45], which can be expressed as (26) at the top of the next page.…”
Section: B Approximate Transformationsmentioning
confidence: 99%
“…Instead of addressing the general scenario, in the literature there have been several works [11]- [14] considering various specific setups. For example, the authors in [11], [12] considered the case with wireless powered AF relaying, where the ER eavesdroppers can only overhear the confidential information relaying from HNs in the second time slot. The optimal AF relaying processing and AN beamforming at HNs are jointly designed to maximize the sum secrecy rate.…”
Section: A the Case With Single-antenna H-apmentioning
confidence: 99%
“…Convexification [5,6], security is an absolutely central criterion in designing transceivers, in the context of telemedicine 2 Mathematical Problems in Engineering games [7,8]; cooperative relay networks [9,10]; wireless information power transfer and energy harvesting scenarios [11,12]; or low-rank beamforming issue [13].…”
Section: General Perspective Chiefly According To the Principlementioning
confidence: 99%