Wireless Security Employing Opportunistic Relays and an Adaptive Encoder Under Outdated CSI and Dual-Correlated Nakagami- $m$ Fading
Citations
57 citations
Additional excerpts
...Some initial information theoretic work on physical layer security was done by Wyner in [23], following which many recent works have been conducted to mitigate the eavesdropping by using different techniques, such as artificial noise (AN) or jamming [24]–[26], joint beamforming [27], relaying [28], [29], interference management [30], [31], etc....
[...]
35 citations
12 citations
Additional excerpts
..., correlated channels) are investigated in [26]–[28]....
[...]
9 citations
9 citations
References
[...]
7,139 citations
[...]
7,129 citations
"Wireless Security Employing Opportu..." refers background in this paper
...Technical Literature Review Concerning theoretical developments for informationtheoretic, a wiretap model was first proposed in [7], and later outlined in [8]....
[...]
2,624 citations
"Wireless Security Employing Opportu..." refers methods in this paper
...The best relay is an OR with the highest instantaneous SNR under perfect-coherence conditions by employing selection combining (SC); Scenario 2: Transmission from Source to Destination using the NLoS SD link — Communications from Source to Destination occurs over one stage, where Scenario 2 is useful for backhaul, macro-macro, or micro-macro under 5G communications [3]....
[...]
1,759 citations
"Wireless Security Employing Opportu..." refers background in this paper
...Technical Literature Review Concerning theoretical developments for informationtheoretic, a wiretap model was first proposed in [7], and later outlined in [8]....
[...]
767 citations
"Wireless Security Employing Opportu..." refers background or methods in this paper
...INTRODUCTION PHYSICAL layer security (PLS) has become an important research topic in recent years because of the booming of smart devices, which may wiretap into other transmission [1]–[6], causing security breach....
[...]
...Because PLS analysis under dual correlated Nakagami-m fading environments has not yet been performed in the existing literature, the severity of m ∈ [12 , 1) has not been thoroughly understood....
[...]