2018
DOI: 10.1016/j.adhoc.2018.01.012
|View full text |Cite
|
Sign up to set email alerts
|

Exact secrecy throughput capacity study in mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 30 publications
0
12
0
Order By: Relevance
“…According to the Lyapunov optimization theorem [22] and substituting (18) to (19), the upper bound of ∆ U (Θ(t)) can be expressed as:…”
Section: Algorithm Performancementioning
confidence: 99%
See 1 more Smart Citation
“…According to the Lyapunov optimization theorem [22] and substituting (18) to (19), the upper bound of ∆ U (Θ(t)) can be expressed as:…”
Section: Algorithm Performancementioning
confidence: 99%
“…After that, Zheng et al [17] extended the infinite secure encoding blocklength to the finite case and revealed the relation of secrecy outage probability to the length of codewords. As for the mobile ad hoc networks, Li et al [18] jointly exploited cooperative jamming and secrecy guard zone scheme and derived the exact secrecy throughput based on the physical layer security technology. To enhance security, Zhu et al [19] employed directional antennas and evaluated the secure secrecy performance in millimeter wave ad hoc networks.…”
mentioning
confidence: 99%
“…Various studies have been carried out to analyse and further enhance the traffic carrying capacity of different types of wireless ad hoc networks, from different aspects [6,22,23]. The RF spectrum is considered the most precious ingredient in setting up of a wireless network and a huge amount of work has been done to efficiently utilise this resource for different networks, especially for ad hoc and cognitive radio networks [24,25], which shows the benefits of effective scheduling and spectrum sharing techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, the M2M communication is maturing to enhance the network's energy and spectral efficiency through a large number of devices with shorter communication links [3,4]. Therefore, these networks have been the key area of research for the last few years [5][6][7][8][9]. In addition, the design of medium access control (MAC) protocol for these distributed wireless networks is a crucial element for their transmission handling capacity owing to the randomly distributed transceivers with simultaneous transmissions in the same frequency channel [5,[10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…Hence, ad hoc networks have been the leading area of investigation for the last few years [5,[8][9][10].…”
Section: Introductionmentioning
confidence: 99%