Filters








19,394 Hits in 4.8 sec

Analyzing Amplify-and-Forward and Decode-and-Forward Cooperative Strategies in Wyner's Channel Model

Pengyu Zhang, Jian Yuan, Jianshu Chen, Jian Wang, Jin Yang
<span title="">2009</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xu3nssyjojgz5moccrokj4jz7q" style="color: black;">2009 IEEE Wireless Communications and Networking Conference</a> </i> &nbsp;
In addition, secrecy constraints in cooperative secure communication are discussed and are used to explain the differences in AF and DF scheme.  ...  Detailed analysis of AF and DF scheme reveals a trade off between secrecy area and request secrecy rate.  ...  ACKNOWLEDGMENT The authors would like to thank China Broadband Wireless Research Center, ARTC, Motorola, for her kind support.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/wcnc.2009.4917597">doi:10.1109/wcnc.2009.4917597</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/wcnc/ZhangYCWY09.html">dblp:conf/wcnc/ZhangYCWY09</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hj5oes5lpffb3d3b6vxbat6nm4">fatcat:hj5oes5lpffb3d3b6vxbat6nm4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120714072310/http://people.cs.umass.edu/~pyzhang/papers/WCNC09_Paper.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/52/80/5280a1635e550712aa236fb73eaa9bd190fa19ee.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/wcnc.2009.4917597"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL

Vaibhav Kumar Gupta, Poonam Jindal
<span title="2014-06-01">2014</span> <i title="ICT Academy"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uxetzvijnjcd3bstva3cpdbqoi" style="color: black;">ICTACT Journal on Communication Technology</a> </i> &nbsp;
The performance of the traditional cooperation schemes in terms of secrecy rate has been investigated with a different scenario where relay node helps the eavesdropper to deteriorate the secrecy rate.  ...  Amplify-and-forward, cooperation, decode-and-Forward, secrecy rate, relay.  ...  The comparative analysis of the system performance in terms of secrecy rate with respect to system parameters has been presented for various cooperation protocols i.e. DF, AF and CF.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21917/ijct.2014.0133">doi:10.21917/ijct.2014.0133</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lcizbkocxffvdcm6jgtc5iqeci">fatcat:lcizbkocxffvdcm6jgtc5iqeci</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171202094939/http://ictactjournals.in/paper/IJCT_Spl_Paper_4_929_935.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/58/99/589998538029ad37ed0b4fb9100f6bf691228ff8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21917/ijct.2014.0133"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Analysis of Physical Layer Security via Co-operative Communication in Internet of Things

Aparna K. Nair, Shaniba Asmi, A. Gopakumar
<span title="">2016</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kcayf4mk7zbrbhvdwizgrxaruu" style="color: black;">Procedia Technology - Elsevier</a> </i> &nbsp;
Physical layer security approaches based on node cooperation promise secure communication even in the presence of an eavesdropper.  ...  Also a method has been discussed for enhancing the secrecy rate by using two heuristic algorithms: "hill-climbing" and "random-search".  ...  time and iterations for obtaining the maximum secrecy rate.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.protcy.2016.05.162">doi:10.1016/j.protcy.2016.05.162</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/agpplrbbozdffgcc6qxe6u7e6q">fatcat:agpplrbbozdffgcc6qxe6u7e6q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922080013/http://publisher-connector.core.ac.uk/resourcesync/data/elsevier/pdf/00d/aHR0cDovL2FwaS5lbHNldmllci5jb20vY29udGVudC9hcnRpY2xlL3BpaS9zMjIxMjAxNzMxNjMwMjUxMQ%3D%3D.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3d/d2/3dd282add4c977d02e189aafa9a49c3948fe8104.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.protcy.2016.05.162"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

A REVIEW ON DISTRIBUTED BEAM FORMING TECHNIQUES -AN APPROACH IN WIRELESS RELAY NETWORKS

Megha G. Paserkar .
<span title="2014-11-25">2014</span> <i title="eSAT Publishing House"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/m4rdj3kwwfcbvfzkv6kcnagwtm" style="color: black;">International Journal of Research in Engineering and Technology</a> </i> &nbsp;
For such a scenario secrecy rate of the network provide a good measure of performance of the system.  ...  Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy.  ...  However, due to the presence of one or more eavesdropper, secrecy of communication is in jeopardy. For such a scenario secrecy rate of the network provide a good measure of performance of the system.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15623/ijret.2014.0311071">doi:10.15623/ijret.2014.0311071</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/x2umrdqbdne5dfyzy33yojq5ue">fatcat:x2umrdqbdne5dfyzy33yojq5ue</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813081445/http://esatjournals.net/ijret/2014v03/i11/IJRET20140311071.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/09/a1/09a11c05a3403444f1d4ba5fb0c62270a90c53c9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15623/ijret.2014.0311071"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Impact of Antenna Selection on Physical-Layer Security of NOMA Networks

Dan Deng, Chao Li, Lisheng Fan, Xin Liu, Fasheng Zhou
<span title="2018-07-03">2018</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6o4hgxplrbehxg4t53ub7zmfha" style="color: black;">Wireless Communications and Mobile Computing</a> </i> &nbsp;
We study the impact of antenna selection on the system secure communication through deriving the analytical expression of the secrecy outage probability along with the asymptotic expression in the high  ...  In particular, the secrecy diversity order of the system is equal to the antenna number, when the interference from the second user is limited.  ...  The authors in [30] optimized the secrecy sum rate of multiple users, in order to optimize the system design.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2018/2390834">doi:10.1155/2018/2390834</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mnuvx7gfjjdahj34k6umwd57cm">fatcat:mnuvx7gfjjdahj34k6umwd57cm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190224180639/http://pdfs.semanticscholar.org/6654/0d1efd5ada0d643541228bd11ee737aa3671.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/66/54/66540d1efd5ada0d643541228bd11ee737aa3671.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2018/2390834"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Secrecy Outage Probability Analysis based on Cognitive Decode-and-forward Relaying

Ruoyu Su, Xiaojun Sun, Fei Ding, Dengyin Zhang, Hongbo Zhu, M. I. M. Wahab
<span title="">2019</span> <i title="Computers, Materials and Continua (Tech Science Press)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/amujz7fcqna6do727z6ev3ueo4" style="color: black;">Computers Materials &amp; Continua</a> </i> &nbsp;
The simulation results show that the relay selection can reduce the outage probability in accordance with our theoretical analysis.  ...  Wireless communications have to face to several different security issues in practice due to the nature of broadcast.  ...  Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32604/cmc.2020.06864">doi:10.32604/cmc.2020.06864</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/esj5xnk2lretbcfmgockvjl3i4">fatcat:esj5xnk2lretbcfmgockvjl3i4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200709193904/http://www.techscience.com/cmc/v62n3/38361/pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3c/e6/3ce6496ed50d5b07e2e1c2865351cd5488280571.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32604/cmc.2020.06864"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System

Cheol Jeong, Il-Min Kim, Dong In Kim
<span title="">2012</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/gkn2pu46ozb4tmkxczacnmtvkq" style="color: black;">IEEE Transactions on Signal Processing</a> </i> &nbsp;
In this paper, the source and relay beamforming is jointly designed to maximize the secrecy rate in the cooperative scheme.  ...  The conditions under which the cooperative scheme achieves a higher secrecy rate than the noncooperative scheme are derived in the low and high signal-to-noise ratio (SNR) regimes of the source-relay and  ...  ASYMPTOTIC SECRECY RATE ANALYSIS Considering two different strategies, noncooperative and cooperative, a natural and important question arising is "which one achieves a higher secrecy rate?"  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tsp.2011.2172433">doi:10.1109/tsp.2011.2172433</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jph4gldbd5dvza6xvh6c7izaza">fatcat:jph4gldbd5dvza6xvh6c7izaza</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170830074257/http://my.ece.queensu.ca/Research/Labs/WITL/files/J_53.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d5/af/d5afa0741ecf3179e3b9a34db1d6fede5512bce6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tsp.2011.2172433"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Secrecy outage of threshold-based cooperative relay network with and without direct links

Khyati Chopra, Ranjan Bose, Anupam Joshi
<span title="2018-05-29">2018</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sjaucqv5czbyxdt75q6vkociju" style="color: black;">EURASIP Journal on Information Security</a> </i> &nbsp;
We have shown that the improvement in predetermined threshold, eavesdropper channel quality, direct links, and required secrecy rate significantly affects the secrecy performance of the system.  ...  In this paper, we investigate the secrecy outage performance of a dual-hop decode-and-forward (DF) threshold-based cooperative relay network, both with and without the direct links between source-eavesdropper  ...  We are also immensely grateful to the reviewers for their salient observations and insights that significantly improved the manuscript. Funding There is no funding available for this research work.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13635-018-0077-8">doi:10.1186/s13635-018-0077-8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cswkbxka25bylh73soli7e6p5a">fatcat:cswkbxka25bylh73soli7e6p5a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190429060122/https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-018-0077-8" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/08/26/08266167e8b37ebcc2e3b1b569e06e169d764db5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13635-018-0077-8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

Security enhancement of wireless networks with wireless-powered full-duplex relay and friendly jammer nodes

Zahra Mobini, Mohammadali Mohammadi, Chintha Tellambura
<span title="">2017</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jtcdcetsmvdmjcshq24lhzakwu" style="color: black;">2017 IEEE International Conference on Communications Workshops (ICC Workshops)</a> </i> &nbsp;
in the system.  ...  In this paper we propose an energy harvesting-based cooperative jamming and full-duplex relaying scheme to enhance the secrecy rate for wireless communication between a source node and a destination node  ...  In [9] , [10] , it was shown that by introducing cooperative transmission into secrecy communication systems the outage probability approaching zero can be achieved.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iccw.2017.7962843">doi:10.1109/iccw.2017.7962843</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icc/MobiniMT17.html">dblp:conf/icc/MobiniMT17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bczno33qabcyff4rnsfu2axroy">fatcat:bczno33qabcyff4rnsfu2axroy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170401033957/http://www.ece.ualberta.ca:80/~chintha/resources/papers/2017/Zahra_ICC.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/12/31/1231cea8943a48bdb80d2868acef6aae00ac3bed.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iccw.2017.7962843"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Three-phase Cooperative Jamming Based Improving PHY Security for Multicast Network with an Untrusted Relay

Xingqun Fu, An Li, Panagiotis G Sarigiannidis
<span title="2016-12-31">2016</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/aoxdam2x3rcszlweqkjkp7qcyy" style="color: black;">International Journal of Future Generation Communication and Networking</a> </i> &nbsp;
A three-phase AF-based cooperative jamming with power allocation is proposed to enhance the system secrecy rate.  ...  In particular, we formulate and analyze the optimal power allocation problems to maximize the achievable worse secrecy rate or secrecy sum-rate subject to the source and relay power constraints.  ...  Otherwise, 1 shall be selected as Numerical Results In this section, numerical results are provided to verify our theoretical analysis on the system secrecy rate of the proposed CJP scheme for multicast  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijfgcn.2016.9.12.08">doi:10.14257/ijfgcn.2016.9.12.08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/d5r7z4pfzjbc3g5n6crwyjedoq">fatcat:d5r7z4pfzjbc3g5n6crwyjedoq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602101333/http://www.sersc.org/journals/IJFGCN/vol9_no12/8.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/49/66/49662f2792f90f93b465b7226c655ede9e14bf5b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijfgcn.2016.9.12.08"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Secure Performance Analysis and Optimization for FD-NOMA Vehicular Communications [article]

Lai Wei, Yingyang Chen, Dongsheng Zheng, Bingli Jiao
<span title="2020-11-06">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In order to analyze the security performance of V2V communications, we introduce a cooperative NOMA V2V system model with an FD relay.  ...  The increasing demand of transmit rates and various requirements of quality of services (QoS) in vehicular communication scenarios call for the integration of V2V communication systems and potential techniques  ...  ERGODIC SECRECY SUM RATE ANALYSIS In this section, we analyze the ergodic secrecy sum rate of the proposed FD-NOMA based V2V system.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2011.03199v1">arXiv:2011.03199v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/blz2hptkcnbglhvaegrdck22qy">fatcat:blz2hptkcnbglhvaegrdck22qy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201109023414/https://arxiv.org/ftp/arxiv/papers/2011/2011.03199.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1d/47/1d47f50006ac64632ad9005b59f528a298e5646e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2011.03199v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Opportunistic relay selection for cooperative networks with secrecy constraints

I. Krikidis
<span title="">2010</span> <i title="Institution of Engineering and Technology (IET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hilohscapjgk3kxfrc3gt64bvm" style="color: black;">IET Communications</a> </i> &nbsp;
This study deals with opportunistic relay selection in cooperative networks with secrecy constraints, where an eavesdropper node tries to overhead the source message.  ...  The first scheme assumes an instantaneous knowledge of the eavesdropper channels and maximises the achievable secrecy rate.  ...  It is worth noting that this assumption is well known in the cooperative literature for systems with [4, 5] and without [7] secrecy constraints and simplifies our analysis.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/iet-com.2009.0634">doi:10.1049/iet-com.2009.0634</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qawg6l6tpng2daq2yrxjp5fxy4">fatcat:qawg6l6tpng2daq2yrxjp5fxy4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170830044215/http://www.eng.ucy.ac.cy/krikidis/resources/J20.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e9/af/e9af8e0c13dde86ede0517ab3851005c2e586726.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/iet-com.2009.0634"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Performance Analysis of Cooperative Communication System

Wei ZHANG, Xian-yi RUI
<span title="2017-07-27">2017</span> <i title="DEStech Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/52spf3of4jbu5da2xrhvubclcy" style="color: black;">DEStech Transactions on Computer Science and Engineering</a> </i> &nbsp;
With the CSI of eavesdropper and the power allocation of source node and relay nodes are considered, the secrecy performance of cooperative communication system can be improved effectively.  ...  However, in the actual transmission system, there will be potential eavesdropper, and the traditional relay selection scheme will greatly reduce the security of the system.  ...  Conclusion In this letter, we simulated and analyzed the performance of cooperative communication system.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12783/dtcse/ameit2017/12298">doi:10.12783/dtcse/ameit2017/12298</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r3ooczzckzhhfapzonexvefxhq">fatcat:r3ooczzckzhhfapzonexvefxhq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719192206/http://dpi-proceedings.com/index.php/dtcse/article/download/12298/11835" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/28/2a/282a4cdc111746fc2b755484a396299271aca9f6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12783/dtcse/ameit2017/12298"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Cooperative Jamming for Wireless Physical Layer Security [article]

Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent Poor
<span title="2009-07-28">2009</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
A novel system design is proposed for determining the antenna weights and transmit power of source and relay, so that the system secrecy rate is maximized subject to a total transmit power constraint,  ...  or, the transmit power is minimized subject to a secrecy rate constraint.  ...  We consider the practical case in which the system can be designed so that the secrecy rate is positive.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/0907.4996v1">arXiv:0907.4996v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3xpfmsc7tzcwxmvmpnwqy52tsa">fatcat:3xpfmsc7tzcwxmvmpnwqy52tsa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200831150955/https://arxiv.org/pdf/0907.4996v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3b/68/3b68613da178b26c8a0573f5ea1468c045867c62.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/0907.4996v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Secrecy outage of cooperative relay network with and without eavesdropper's direct link

Khyati Chopra, Ranjan Bose, Anupam Joshi
<span title="">2017</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zeb3txwynbdxnl6s4zvif6j7rq" style="color: black;">2017 Twenty-third National Conference on Communications (NCC)</a> </i> &nbsp;
In this paper, a source communicates to the destination with the cooperation of a relay, in the presence of an eavesdropper.  ...  We have shown that the increase in target secrecy rate and eavesdropper channel quality significantly affects the outage performance of the system.  ...  An outage event occurs when the instantaneous secrecy rate is lower than the target secrecy rate of the cooperative relay system, given as R s where, R s > 0 and ρ = 2 2Rs [15] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ncc.2017.8077065">doi:10.1109/ncc.2017.8077065</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ncc/ChopraBJ17.html">dblp:conf/ncc/ChopraBJ17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kgur26ucqbft3paul5b24t422q">fatcat:kgur26ucqbft3paul5b24t422q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201107004141/https://mdsoar.org/bitstream/handle/11603/11605/871.pdf;jsessionid=41BFE6DF8B94D10D29261CCA203EE19E?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/10/95/1095aaed43be78af70cd96a0045ae6bacaf162fb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ncc.2017.8077065"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 19,394 results