2017
DOI: 10.1109/access.2017.2712766
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Rates and Optimal Power Allocation for Full-Duplex Decode-and-Forward Relay Wire-Tap Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…With considering the effect of β for the data rate, we delete invalid actions which cannot satisfy (21) in the priori informationbased learning algorithm and embed it in the proposed scheme.…”
Section: A Actionmentioning
confidence: 99%
See 1 more Smart Citation
“…With considering the effect of β for the data rate, we delete invalid actions which cannot satisfy (21) in the priori informationbased learning algorithm and embed it in the proposed scheme.…”
Section: A Actionmentioning
confidence: 99%
“…In [20], the optimal secrecy performance was achieved with the convex optimization in the FD relay network by using power allocation. A joint relay selection and power allocation scheme was proposed by using the dominant balance to achieve a high secrecy rate in [21]. In [22], a simple joint relay selection and power allocation scheme based on the SNR was proposed to maximize the instantaneous secrecy rate.…”
Section: Introductionmentioning
confidence: 99%
“…Therein, based on the performance analysis for the power allocation at the receiver, it was shown that the destination usually does not use all of its available power due to the residual self-interference. Furthermore, different works have analyzed the secrecy performance of FD relaying networks [16]- [19]. For instance, in [16], the SOP of a multiple FD-DF relay network with imperfect channel state information (CSI) was analyzed.…”
Section: Introductionmentioning
confidence: 99%
“…The authors in [18] proposed an FD jamming relay scheme, which was analyzed in terms of SOP, where the relay simultaneously receives data from the source and sends jamming signals to the eavesdroppers, and then, in a different transmission block, the relay switches to HD mode to retransmit the information to the destination. In [19], the secrecy rates, and optimal power allocation were investigated for a two-hop FD-DF relaying scheme considering static and ergodic fading channels. Moreover, in [20], an FD destination, was considered to enable destination-based jamming in a cooperative network with multiple AF untrusted relays.…”
Section: Introductionmentioning
confidence: 99%
“…Secrecy cooperation strategies can be broadly categorized as decode-and-forward (DF), amplify-and-Forward (AF), compress-and-forward (CF), and deaf cooperation. The DF scheme requires the relay to decode the source message whose performance mainly relays on the source-relay channel (e.g., [19], [20], [25]- [27]). The AF scheme arranges the relay node to scale and retransmit the received signal (e.g., [25], [28]- [30]).…”
Section: Introductionmentioning
confidence: 99%