메뉴 건너뛰기




Volumn 64, Issue 6, 2015, Pages 2703-2709

Opportunistic transmission of nonregenerative network with untrusted relay

Author keywords

Nonregenerative; opportunistic transmission; secrecy outage probability; untrusted relay; variable gain relaying.

Indexed keywords

TRANSPORTATION;

EID: 84933057122     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2014.2345568     Document Type: Article
Times cited : (35)

References (15)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 8, pp. 656-715, Oct. 1949
    • (1949) Bell Syst. Tech. J , vol.28 , Issue.8 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-Tap channel
    • Oct
    • A. D. Wyner, "The wire-Tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975
    • (1975) Bell Syst. Tech. J , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 5044252003 scopus 로고    scopus 로고
    • Cooperative diversity in wireless networks: Efficient protocols and outage behavior
    • Dec
    • J. N. Laneman, D. N. C. Tse, and G.W.Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3062-3080
    • Laneman, J.N.1    Tse, D.N.C.2    Wornell, G.W.3
  • 4
    • 84863044084 scopus 로고    scopus 로고
    • Opportunistic cooperative networking: To relay or not to relay?
    • Feb
    • X. Gong, T. P. S. Chandrashekhar, J. Zhang, and H. V. Poor, "Opportunistic cooperative networking: To relay or not to relay?" IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 1-9, Feb. 2012
    • (2012) IEEE J. Sel. Areas Commun , vol.30 , Issue.2 , pp. 1-9
    • Gong, X.1    Chandrashekhar, T.P.S.2    Zhang, J.3    Poor, H.V.4
  • 5
    • 84869429781 scopus 로고    scopus 로고
    • Two-hop opportunistic scheduling in cooperative cellular networks
    • Nov
    • J. Kim, J. Lee, K. Son, S. Song, and S. Chong, "Two-hop opportunistic scheduling in cooperative cellular networks," IEEE Trans. Veh. Technol., vol. 61, no. 9, pp. 4194-4199, Nov. 2012
    • (2012) IEEE Trans. Veh. Technol , vol.61 , Issue.9 , pp. 4194-4199
    • Kim, J.1    Lee, J.2    Son, K.3    Song, S.4    Chong, S.5
  • 6
    • 7544225775 scopus 로고    scopus 로고
    • Exact symbol error probability of a cooperative network in a Rayleigh-fading environment
    • Sep
    • P. A. Anghel and M. Kaveh, "Exact symbol error probability of a cooperative network in a Rayleigh-fading environment," IEEE Trans. Wireless Commun., vol. 3, no. 5, pp. 1416-1421, Sep. 2004
    • (2004) IEEE Trans. Wireless Commun , vol.3 , Issue.5 , pp. 1416-1421
    • Anghel, P.A.1    Kaveh, M.2
  • 7
    • 11844274674 scopus 로고    scopus 로고
    • A performance study of dual-hop transmissions with fixed gain relays
    • Nov
    • M. O. Hasna and M.-S. Alouini, "A performance study of dual-hop transmissions with fixed gain relays," IEEE Trans. Wireless Commun., vol. 3, no. 6, pp. 1963-1968, Nov. 2004
    • (2004) IEEE Trans. Wireless Commun , vol.3 , Issue.6 , pp. 1963-1968
    • Hasna, M.O.1    Alouini, M.-S.2
  • 8
    • 34249313010 scopus 로고    scopus 로고
    • Tracing malicious relays in cooperative wireless communications
    • Jun
    • Y. Mao and M. Wu, "Tracing malicious relays in cooperative wireless communications," IEEE Trans. Inf. Forensics Security, vol. 2, no. 2, pp. 198-212, Jun. 2007
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.2 , pp. 198-212
    • Mao, Y.1    Wu, M.2
  • 9
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 10
    • 84877718412 scopus 로고    scopus 로고
    • Secure communication via an untrusted non-regenerative relay in fading channels
    • May
    • J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013
    • (2013) IEEE Trans. Signal Process , vol.61 , Issue.10 , pp. 2536-2550
    • Huang, J.1    Mukherjee, A.2    Swindlehurst, A.L.3
  • 11
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-And-forward MIMO untrusted relay system
    • Jan
    • C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-And-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012
    • (2012) IEEE Trans. Signal Process , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.-M.2    Kim, D.I.3
  • 12
    • 84891634602 scopus 로고    scopus 로고
    • Link adaptation with untrusted relay assignment: Design and performance analysis
    • Dec
    • H. Khodakarami and F. Lahouti, "Link adaptation with untrusted relay assignment: Design and performance analysis," IEEE Trans. Commun., vol. 61, no. 2, pp. 4874-4883, Dec. 2013
    • (2013) IEEE Trans. Commun , vol.61 , Issue.2 , pp. 4874-4883
    • Khodakarami, H.1    Lahouti, F.2
  • 13
    • 74549179778 scopus 로고    scopus 로고
    • Hard/soft detection with limited CSI for multi-hop systems
    • Jul
    • M. Malkawi and I.-M. Kim, "Hard/soft detection with limited CSI for multi-hop systems," IEEE Trans. Wireless Commun., vol. 8, no. 7, pp. 3435-3441, Jul. 2009
    • (2009) IEEE Trans. Wireless Commun , vol.8 , Issue.7 , pp. 3435-3441
    • Malkawi, M.1    Kim, I.-M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.