2019
DOI: 10.1587/transcom.2018ebp3153
|View full text |Cite
|
Sign up to set email alerts
|

Security Performance Analysis for Relay Selection in Cooperative Communication System under Nakagami-m Fading Channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…For the reason that Nakagamim distribution is equal to Rayleigh distribution, Rician distribution and unilateral Gaussian distribution respectively when it chooses different shape parameter, which can better fit with the actual channel fading. Therefore, it is more practical to study other performance metrics such as achievable secrecy rate, optimal power allocation, secrecy throughout under Nakagami-m fading channels [22], [36], [39]. The numerical results show as follows: Firstly, the SRT of the BRS scheme always performs better than that of ERS scheme.…”
Section: Introductionmentioning
confidence: 93%
See 1 more Smart Citation
“…For the reason that Nakagamim distribution is equal to Rayleigh distribution, Rician distribution and unilateral Gaussian distribution respectively when it chooses different shape parameter, which can better fit with the actual channel fading. Therefore, it is more practical to study other performance metrics such as achievable secrecy rate, optimal power allocation, secrecy throughout under Nakagami-m fading channels [22], [36], [39]. The numerical results show as follows: Firstly, the SRT of the BRS scheme always performs better than that of ERS scheme.…”
Section: Introductionmentioning
confidence: 93%
“…Recently, cooperation communication is exploited as an effective way to guarantee physical layer security of wireless communication [22]- [24]. In cooperative communication networks, relays act as intermediate wireless devices and adopt amplify-and-forward (AF) and decode-and-forward (DF) protocols to process received signals.…”
Section: Introductionmentioning
confidence: 99%
“…(3) Data security: The key parameters and sensitive data in industrial internet put forward higher requirements for data privacy and security protection. The heterogeneous network structure needs to ensure the data security protection from the sensor, communication protocol and the whole process of information processing [31,32].…”
Section: Blockchain-based Iiot Technology Analysismentioning
confidence: 99%
“…Although some scholars have proposed a distributed access control method to confidential information, it brings too much delay and overhead. IPSec and TLS are used in reference [32] to provide authentication and privacy, but they are not suitable for various computing devices with limited resources due to the large computing cost. Their consensus mechanism and block validation are contrary to the requirements of complex blockchain solutions.…”
Section: Blockchain-based Iiot Technology Analysismentioning
confidence: 99%