2020 4th International Conference on Recent Advances in Signal Processing, Telecommunications &Amp; Computing (SigTelCom) 2020
DOI: 10.1109/sigtelcom49868.2020.9199050
|View full text |Cite
|
Sign up to set email alerts
|

Key Secrecy Performance Metrics of Overlay Networks with Energy Scavenging and Artificial Noise

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 11 publications
0
8
0
1
Order By: Relevance
“…The secondary transmitter harvests RF energy from the primary transmitter and transmits not only its private operating in the overlay mode (i.e., relay primary message and transmit secondary message) and the jammer by network-coding three (primary, secondary, artificial noise) signals. Moreover, [24] and [25] proposed the SOP analysis.…”
Section: A Prior Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The secondary transmitter harvests RF energy from the primary transmitter and transmits not only its private operating in the overlay mode (i.e., relay primary message and transmit secondary message) and the jammer by network-coding three (primary, secondary, artificial noise) signals. Moreover, [24] and [25] proposed the SOP analysis.…”
Section: A Prior Workmentioning
confidence: 99%
“…Imperfect channel estimation and artificial noise cancellation are ineluctable in practical systems and hence, this paper studies their impact on security performance of ANaEHON in [24] and [25]. It contributes the following:…”
Section: B Motivations and Contributionsmentioning
confidence: 99%
“…Whilst most publications have investigated the PHY security for energy harvesting (interweave/underlay) networks, a handful works have paid attention to the overlay mechanism [5,[21][22][23][24][25][26][27][28]. More specifically, [21] investigated the almost similar system model to ours but EHONs are secured by asking a devoted jammer to jam the eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…Lately, [26][27][28] suggested that a two-phase ( [26,28] are conference versions where [26] considered Rayleigh fading while [28] generalized [26] with Nakagami-m fading. Because of conference versions, [26,28] briefly outlined few results without any proof) transmission scheme incorporated with artificial noise generation in EHONs to enhance spectral efficiency and security capability. Moreover, [26][27][28] analyzed the SOP of cognitive and primary communications in EHONs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation