2020
DOI: 10.1109/tifs.2019.2940906
|View full text |Cite
|
Sign up to set email alerts
|

Impact of Outdated CSI on the Secrecy Performance of Wireless-Powered Untrusted Relay Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 37 publications
0
10
0
Order By: Relevance
“…To utilize the DC programming and solve the non-convex objective function in (23), the objective function in ( 23) can be rewritten as…”
Section: B DC Programming For Sub-optimal Transmission Power With the Fixed σ Mmentioning
confidence: 99%
See 2 more Smart Citations
“…To utilize the DC programming and solve the non-convex objective function in (23), the objective function in ( 23) can be rewritten as…”
Section: B DC Programming For Sub-optimal Transmission Power With the Fixed σ Mmentioning
confidence: 99%
“…Then the EH jammers and relay nodes are integrated into the two-way relay system [20], [21]. To simplify the system model and reduce additional overhead, destination-based jamming (DBJ) was proposed to guarantee security transmission in wireless-powered relay networks [23]- [27]. In [23], [24], the resource division factors were optimized to improve the secrecy rate.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the presence of outdated CSI, [13] investigated the on-off scheme to help perform secure transmission and presented the design of wiretap coding parameters. Moreover, based on the study of [10], the optimal control of the artificial noise power level under outdated CSI were derived to maximize the secrecy performance of wireless powered untrusted relay networks in [14], [15].…”
Section: Introductionmentioning
confidence: 99%
“…To enlarge the perfect secrecy rate, current techniques focus on improving the quality of authenticated links and/or to degrade potential wiretap links. In particular, the works of [2] and [3] employed jamming signal to prevent untrusted nodes of overhearing the confidential information. The work of [4] combined both the jamming signal and a relay-selection method to rise the security advantage from both user's and eavesdropper's sides where a relay that assists the communication at the highest perfect secrecy rate was selected to forward the confidential information.…”
Section: Introductionmentioning
confidence: 99%