2019
DOI: 10.1049/iet-com.2018.5914
|View full text |Cite
|
Sign up to set email alerts
|

Physical layer security of hybrid satellite‐terrestrial relay networks with multiple colluding eavesdroppers over non‐identically distributed Nakagami‐ m fading channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(16 citation statements)
references
References 44 publications
1
15
0
Order By: Relevance
“…The Shadowed-Rician fading parameters of satellite channel are given in Table 1, where o ∈ {D, E}. 9,10,16 Unless otherwise stated, in the following simulation, we set the antenna number of the D as three, the transmit rate as R t = 3bits/s/Hz, the secrecy rate as R s = 2bits/s/Hz, the path loss factor as 𝜇 = 2.2, the jamming SNR as 60 dB. The hardware impairment levels are given as 𝜅 D = 𝜅 E = 0.15, which is a typical value for hardware impairment in ground transceivers.…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…The Shadowed-Rician fading parameters of satellite channel are given in Table 1, where o ∈ {D, E}. 9,10,16 Unless otherwise stated, in the following simulation, we set the antenna number of the D as three, the transmit rate as R t = 3bits/s/Hz, the secrecy rate as R s = 2bits/s/Hz, the path loss factor as 𝜇 = 2.2, the jamming SNR as 60 dB. The hardware impairment levels are given as 𝜅 D = 𝜅 E = 0.15, which is a typical value for hardware impairment in ground transceivers.…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
“…By inserting (10) and ( 11) into ( 20) and ( 21), and combining with ( 5) and ( 3), the COP and the SOP under this scenario can be given, respectively, as…”
Section: Wojmentioning
confidence: 99%
See 2 more Smart Citations
“…In this context, many multi-antenna related physical-layer security works have been developed to investigate secure transmission schemes (e.g, [3][4][5][6]). Additionally, these multi-antenna secure transmission schemes have been fully investigated over the various wireless communications systems, including conventional cellular systems [7], wireless powered heterogeneous network [8,9], hybrid satellite-terrestrial relay network [10], device-to-device underlaid cellular network [11], energy harvesting cognitive radio network [12] etc. Generally speaking, most of the multi-antenna secure transmission schemes fall into two broad categories: transmit beamforming [12][13][14][15][16][17] and joint optimisation of beamforming and artificial noise (AN) [9,[18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%