2015
DOI: 10.1109/tifs.2014.2360437
|View full text |Cite
|
Sign up to set email alerts
|

Security Enhancement of Cooperative Single Carrier Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
75
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 83 publications
(75 citation statements)
references
References 36 publications
0
75
0
Order By: Relevance
“…It is highlighting that this configuration has numerous practical applications, for instance, in wireless sensor networks (WSN) where the multiantenna nodes convey information via a mobile relay that is restricted to a single antenna due to cost and size limitations, or in device-to-device (D2D) communications scenarios where the relay assists two multi-antenna devices to exchange messages [36]- [42]. Moreover, we follow the similar scenario in [15], [16], [20], [29]- [33], where both of the direct links A → B and A → E are assumed to be nonexistent, due to the direct links may be blocked by an obstruction or suffer from severe shadow fading. By this way, the transmission in the first hop cannot be overheard by Eves.…”
Section: Notationmentioning
confidence: 99%
See 4 more Smart Citations
“…It is highlighting that this configuration has numerous practical applications, for instance, in wireless sensor networks (WSN) where the multiantenna nodes convey information via a mobile relay that is restricted to a single antenna due to cost and size limitations, or in device-to-device (D2D) communications scenarios where the relay assists two multi-antenna devices to exchange messages [36]- [42]. Moreover, we follow the similar scenario in [15], [16], [20], [29]- [33], where both of the direct links A → B and A → E are assumed to be nonexistent, due to the direct links may be blocked by an obstruction or suffer from severe shadow fading. By this way, the transmission in the first hop cannot be overheard by Eves.…”
Section: Notationmentioning
confidence: 99%
“…(3.351.1) and (3.351.2)], the desired expressions can be easily obtained as in (29) for both eavesdropping modes.…”
Section: Appendix B Proof Of Corollarymentioning
confidence: 99%
See 3 more Smart Citations