S Naderi, MR Javan - Turkish Journal of Electrical …, 2017 - journals.tubitak.gov.tr
In this paper, we study the performance of the selection combining and switch and stay combining methods in secure cooperative device-to-device (D2D) communications …
SQ Nguyen, HY Kong - Wireless Personal Communications, 2015 - Springer
By generating a jamming message at the jammer node, a system can reduce wiretapping in the physical layer because this message can refuse the illegal eavesdropper node. The …
P Shams - Wireless Personal Communications, 2020 - Springer
This study investigates the impact of co-channel interference on two-way untrustworthy relay selection over Rayleigh fading environment. The investigation considers that two source …
TT Duy, VNQ Bao - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
In this paper, we study secrecy outage performance of dual-hop relay protocols in underlay cognitive radio network. In particular, we derive exact and asymptotic closed-form …
J Xue, H Zhu, X Liao, Z Su - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
In this paper, we propose a low complexity opportunistic source-relay selection algorithm based on power allocation for multi-source multi-relay cooperative network. We consider …
R Yao, D Song, L Yao, TA Tsiftsis… - 2020 International …, 2020 - ieeexplore.ieee.org
In this paper, considering a multi-user pair and multi-untrusted relay two-way transmission network, a user pair-relay matching scheme is proposed. To maximize the achievable …
PN Son, HY Kong - Wireless Personal Communications, 2015 - Springer
The impact of unavailable relays is a serious issue in cooperative communication schemes, where the operation state of relays affects optimal relay selection. In addition, secure signal …
Lời đầu tiên em xin chân thành gửi lời cảm ơn sâu sắc đến thầy TS. Trần Trung Duy đã hướng dẫn tận tình, chỉ bảo em trong suốt quá trình thực hiện luận văn. Thầy đã trang bị cho …