2022
DOI: 10.1007/978-3-031-08878-0_19
|View full text |Cite
|
Sign up to set email alerts
|

On Secrecy Analysis of UAV-Enabled Relaying NOMA Systems with RF Energy Harvesting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Under Nakagami-m fading, the channel statistics for the IDs and eavesdropper are analyzed. From (25), the CDF of the SINR from I m * to B can be written as shown in (30) at the top of the next page, where…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Under Nakagami-m fading, the channel statistics for the IDs and eavesdropper are analyzed. From (25), the CDF of the SINR from I m * to B can be written as shown in (30) at the top of the next page, where…”
Section: Performance Analysismentioning
confidence: 99%
“…Wireless information security faces significant difficulties as a result of the broadcast nature of wireless channels and the numerous applications of this communication technology [24], [25]. An appealing strategy for boosting information security is physical layer security (PLS), which exploits the inherent properties of wireless channels to ensure that an eavesdropper cannot obtain any useful information about the legitimate information being transmitted in the physical layer [26], [27].…”
mentioning
confidence: 99%