Optimizing Secrecy Performance of Trusted RF Relay against External Eavesdropping
Citations
3 citations
References
13,886 citations
4,028 citations
"Optimizing Secrecy Performance of T..." refers methods in this paper
...PDFs of Y1 and Y2 defined as fY1 and fY2 obtained using transformation of RVs are given as [11]:...
[...]
1,385 citations
"Optimizing Secrecy Performance of T..." refers background in this paper
...By considering a cooperative system with multiple relays in the presence of multiple eavesdroppers, secure rate maximization subject to a total power budget constraint, and power minimization subject to a secrecy rate constraint under AF, DF and CJ have been presented in [4]....
[...]
...Secure communication in the presence of external eavesdroppers under various cooperative strategies like cooperative jamming (CJ), noise forwarding, amplify-and-forward (AF) and decode and forward (DF) have been explored in [4]....
[...]
530 citations
"Optimizing Secrecy Performance of T..." refers background in this paper
...Due to broadcast nature of radio propagation in wireless communication, these systems are extremely vulnerable to eavesdropping attacks from the perspective of security, confidentiality, authentication and privacy [1]....
[...]
214 citations