2015
DOI: 10.1109/twc.2015.2413784
|View full text |Cite
|
Sign up to set email alerts
|

Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
58
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 47 publications
(59 citation statements)
references
References 36 publications
1
58
0
Order By: Relevance
“…In the presence of an external ER, the work in Chen et al 14 examined secure communication between the source and the destination via an EH relay with multiple antennas while the authors in Xing et al 15 studied the secrecy performance of source-destination communication via multiple EH relays. [17][18][19][20][21][22][23] In Huang et al, 17 the authors investigated the secrecy performance of the communication via a multiple antenna untrusted relay in terms of secrecy outage probability. In cases without ERs, the transmission from the source to the destination is still compromised when one may wish to keep the source-destination communication confidential from the relay despite the help of the relay to forward the information.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In the presence of an external ER, the work in Chen et al 14 examined secure communication between the source and the destination via an EH relay with multiple antennas while the authors in Xing et al 15 studied the secrecy performance of source-destination communication via multiple EH relays. [17][18][19][20][21][22][23] In Huang et al, 17 the authors investigated the secrecy performance of the communication via a multiple antenna untrusted relay in terms of secrecy outage probability. In cases without ERs, the transmission from the source to the destination is still compromised when one may wish to keep the source-destination communication confidential from the relay despite the help of the relay to forward the information.…”
Section: Introductionmentioning
confidence: 99%
“…[17][18][19][20][21][22][23] In Huang et al, 17 the authors investigated the secrecy performance of the communication via a multiple antenna untrusted relay in terms of secrecy outage probability. Also, the works on untrusted relay in previous studies [17][18][19][20][21][22] assume that the relay has the internal supplying power and does not need to harvest energy from the source signal. With the same line of Sun et al, Ju et al, and Wang et al, 20-22 the authors in Kalamkar et al 23 considered the problem of secure communication via an EH untrusted relay, where the relay scavenged energy from both the source signal and destination jamming signal.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to obtain an outage probability, however, it is necessary to determine detailed system parameters, followed by complicated high-precision calculations. On the other hand, a diversity order can be used to roughly but quickly compare multiple diversity techniques for a wide range of system parameters and operating environments [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…Considering the practical working condition, the design of secure transmission scheme under channel state information (CSI) uncertainty has already been studied by [10][11][12] with eavesdropper. However, from a robust perspective, relay can also be viewed as a potential eavesdropper [13][14][15][16][17][18][19][20][21][22]. For example, the relay might belong to a heterogeneous network without the same security clearance as the source and the destination nodes.…”
Section: Introductionmentioning
confidence: 99%