2021
DOI: 10.1109/tccn.2021.3074909
|View full text |Cite
|
Sign up to set email alerts
|

A PHY Layer Security of a Jamming-Based Underlay Cognitive Satellite-Terrestrial Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 33 publications
0
13
0
Order By: Relevance
“…The work in [24] inspected secrecy metrics for a dual-hop DF-based multiuser network, under the presence of various eavesdroppers overhearing the second hop. Importantly, the authors of [15], [17], [26], [28], [29], [31], and [33] analyzed the end-to-end PLS of mixed radio-frequency (RF)-optical wireless communication (OWC) systems, where the optical link operates either in indoor (i.e., visible light communications), outdoor (i.e., free-space optics), or in the marine medium (i.e., underwater OWC).…”
Section: A Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The work in [24] inspected secrecy metrics for a dual-hop DF-based multiuser network, under the presence of various eavesdroppers overhearing the second hop. Importantly, the authors of [15], [17], [26], [28], [29], [31], and [33] analyzed the end-to-end PLS of mixed radio-frequency (RF)-optical wireless communication (OWC) systems, where the optical link operates either in indoor (i.e., visible light communications), outdoor (i.e., free-space optics), or in the marine medium (i.e., underwater OWC).…”
Section: A Related Workmentioning
confidence: 99%
“…The authors in [50] analyzed the secrecy performance of a dual-hop hybridterrestrial satellite (HTS) system with an optical feeder, subject to the presence of an eavesdropper per each hop. Lastly, a similar setup was analyzed in [33] by considering an RF-FSO HTS system. Nevertheless, the analysis in all these abovementioned work, ( [31], [33], [48]- [50]), was restricted to a single-antenna assumption in some of or all the nodes along with assuming static nodes with perfect CSI estimation.…”
Section: B Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…The authors designed the UAV trajectory to avoid jamming signals, where the UAV performed reconnaissance tasks and transferred the collected data to the satellite. The work in [31] investigated physical layer security in cognitive satellite-terrestrial networks with jamming, where dual-hop communications were considered under RF and optical links in the first and second hop, respectively. The authors in [32] investigated the closed-form expressions of the secrecy channel capacity and OP for a single relay and perfect CSI.…”
mentioning
confidence: 99%