2016
DOI: 10.1109/tvt.2016.2600658
|View full text |Cite
|
Sign up to set email alerts
|

On Secrecy Rate and Optimal Power Allocation of the Full-Duplex Amplify-and-Forward Relay Wire-Tap Channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 46 publications
0
3
0
Order By: Relevance
“…Recently, secure performance is presented in the context of NOMA implementation [15][16][17][18][19][20][21][22][23][24]. Motivated by these papers, we consider secure outage probability of CR-NOMA.…”
Section: Bulletin Of Electr Eng and Infmentioning
confidence: 99%
“…Recently, secure performance is presented in the context of NOMA implementation [15][16][17][18][19][20][21][22][23][24]. Motivated by these papers, we consider secure outage probability of CR-NOMA.…”
Section: Bulletin Of Electr Eng and Infmentioning
confidence: 99%
“…First, cooperation from relays was introduced to avoid (or to mitigate) the wiretapping region (or its impact) [3,4,[13][14][15][16][17][18][19][20][21][22]. In these works, the directlink from the source to the eavesdropper is usually not closed to the source.…”
Section: Introductionmentioning
confidence: 99%
“…The DF scheme requires the relay to decode the source message whose performance mainly relays on the source-relay channel (e.g., [19], [20], [25]- [27]). The AF scheme arranges the relay node to scale and retransmit the received signal (e.g., [25], [28]- [30]). Deaf cooperation arranges the relay to send interference (or pure noise) which is independent of the source message in order to confuse the eavesdropper (e.g., [4], [18], [21], [22], [29]- [33]).…”
Section: Introductionmentioning
confidence: 99%