2019
DOI: 10.1049/iet-com.2018.6087
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy outage analysis of energy harvesting two‐way relaying networks with friendly jammer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 28 publications
0
10
0
1
Order By: Relevance
“…Inserting Υ in (40), ∆ in (31), and ψ = 1 into (30) results in the precise closed-form formula of SOP p (C 0 ).…”
Section: A Sop For Primary Information X Pmentioning
confidence: 99%
See 1 more Smart Citation
“…Inserting Υ in (40), ∆ in (31), and ψ = 1 into (30) results in the precise closed-form formula of SOP p (C 0 ).…”
Section: A Sop For Primary Information X Pmentioning
confidence: 99%
“…The term ∆ in (51) was already computed in (31) while the term Z 1 in (51) is rewritten after using (18) and (20) for the case of γ s ≥ γ t as…”
Section: B Sop For Secondary Information X Smentioning
confidence: 99%
“…γ PB þ1 has been derived in Appendix. Therefore, by substituting (33)-( 36) into ( 24), we get the closed-form result as (25). 6 - 8 > > > > > > > > > > > > > > > > > > > > > > > < > > > > > > > > > > > > > > > > > > > > > > > : 9 > > > > > > > > > > > > > > > > > > > > > > > = > > > > > > > > > > > > > > > > > > > > > > > ; 8 > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > < > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > : 9 > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > = > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > ; :…”
Section: Exact Outage Performance For All Snrunclassified
“…The works of [7,8] used a beamforming technique to increase the secrecy capacity and/or harvested energy of multi-antenna SWIPT systems by optimizing the beamforming vectors. On the other studies, friendly jamming signals were employed to improve secure communication via an EH relay in which the jammer can interfere with wire-tapped information and provide additional energy at the relay [9]. Another approach presented in [10,11] is to use WEH nodes as jammers that employ their harvested energy to assist the secure links.…”
Section: Introductionmentioning
confidence: 99%