{"id":"https://openalex.org/W2899854445","doi":"https://doi.org/10.1007/s11036-018-1159-z","title":"Performance Analysis for Secure Cooperative Systems Under Unreliable Backhaul Over Nakagami-m Channels","display_name":"Performance Analysis for Secure Cooperative Systems Under Unreliable Backhaul Over Nakagami-m Channels","publication_year":2018,"publication_date":"2018-11-07","ids":{"openalex":"https://openalex.org/W2899854445","doi":"https://doi.org/10.1007/s11036-018-1159-z","mag":"2899854445"},"language":"en","primary_location":{"id":"doi:10.1007/s11036-018-1159-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11036-018-1159-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11036-018-1159-z.pdf","source":{"id":"https://openalex.org/S192894947","display_name":"Mobile Networks and Applications","issn_l":"1383-469X","issn":["1383-469X","1572-8153"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Networks and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s11036-018-1159-z.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040974749","display_name":"Cheng Yin","orcid":"https://orcid.org/0000-0002-9662-3987"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Cheng Yin","raw_affiliation_strings":["Queen\u2019s University Belfast, Belfast, UK"],"raw_orcid":"https://orcid.org/0000-0002-9662-3987","affiliations":[{"raw_affiliation_string":"Queen\u2019s University Belfast, Belfast, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034337802","display_name":"Emiliano Garcia\u2010Palacios","orcid":"https://orcid.org/0000-0002-0180-8840"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Emiliano Garcia-Palacios","raw_affiliation_strings":["Queen\u2019s University Belfast, Belfast, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Queen\u2019s University Belfast, Belfast, UK","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5040974749"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":0.1309,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.5041266,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"24","issue":"2","first_page":"480","last_page":"490"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7944731116294861},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.7258961200714111},{"id":"https://openalex.org/keywords/nakagami-distribution","display_name":"Nakagami distribution","score":0.7188621759414673},{"id":"https://openalex.org/keywords/backhaul","display_name":"Backhaul (telecommunications)","score":0.672812819480896},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6676439046859741},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6593877673149109},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.6518489122390747},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.615589439868927},{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.5316653251647949},{"id":"https://openalex.org/keywords/signal-to-noise-ratio","display_name":"Signal-to-noise ratio (imaging)","score":0.42416971921920776},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3388407230377197},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3302501142024994},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16982361674308777},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12155815958976746},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.0938829779624939},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.08790656924247742},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.0626055896282196}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7944731116294861},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.7258961200714111},{"id":"https://openalex.org/C115098869","wikidata":"https://www.wikidata.org/wiki/Q3258347","display_name":"Nakagami distribution","level":4,"score":0.7188621759414673},{"id":"https://openalex.org/C103760667","wikidata":"https://www.wikidata.org/wiki/Q798444","display_name":"Backhaul (telecommunications)","level":3,"score":0.672812819480896},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6676439046859741},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6593877673149109},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.6518489122390747},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.615589439868927},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.5316653251647949},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.42416971921920776},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3388407230377197},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3302501142024994},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16982361674308777},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12155815958976746},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.0938829779624939},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.08790656924247742},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0626055896282196},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s11036-018-1159-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11036-018-1159-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11036-018-1159-z.pdf","source":{"id":"https://openalex.org/S192894947","display_name":"Mobile Networks and Applications","issn_l":"1383-469X","issn":["1383-469X","1572-8153"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Networks and Applications","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:openaire/3acbe259-631a-4fad-89d5-d6d8d64e1a4c","is_oa":true,"landing_page_url":"https://pure.ulster.ac.uk/en/publications/3acbe259-631a-4fad-89d5-d6d8d64e1a4c","pdf_url":null,"source":{"id":"https://openalex.org/S4306402454","display_name":"Ulster University Research Portal (Ulster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138801177","host_organization_name":"University of Ulster","host_organization_lineage":["https://openalex.org/I138801177"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Yin, C & Garcia-Palacios, E 2019, 'Performance Analysis for Secure Cooperative Systems Under Unreliable Backhaul Over Nakagami-m Channels', Mobile Networks and Applications, vol. 24, pp. 480-490. https://doi.org/10.1007/s11036-018-1159-z","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/ee6588bc-f835-45b8-b706-26dc41c2f1dc","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/ee6588bc-f835-45b8-b706-26dc41c2f1dc","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/162122791/10.1007_2Fs11036_018_1159_z.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Yin, C & Garcia-Palacios, E 2019, 'Performance Analysis for Secure Cooperative Systems Under Unreliable Backhaul Over Nakagami-m Channels', Mobile Networks and Applications, vol. 24, no. 2, pp. 480-490. https://doi.org/10.1007/s11036-018-1159-z","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/ee6588bc-f835-45b8-b706-26dc41c2f1dc","is_oa":true,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85056349396&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Yin , C &amp; Garcia-Palacios , E 2019 , ' Performance Analysis for Secure Cooperative Systems Under Unreliable Backhaul Over Nakagami-m Channels ' , Mobile Networks and Applications , vol. 24 , no. 2 , pp. 480-490 . https://doi.org/10.1007/s11036-018-1159-z","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s11036-018-1159-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11036-018-1159-z","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11036-018-1159-z.pdf","source":{"id":"https://openalex.org/S192894947","display_name":"Mobile Networks and Applications","issn_l":"1383-469X","issn":["1383-469X","1572-8153"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Networks and Applications","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2899854445.pdf","grobid_xml":"https://content.openalex.org/works/W2899854445.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W239939821","https://openalex.org/W1515196959","https://openalex.org/W1951602908","https://openalex.org/W1956248169","https://openalex.org/W1964684947","https://openalex.org/W1974945857","https://openalex.org/W1990826127","https://openalex.org/W2007312804","https://openalex.org/W2043769961","https://openalex.org/W2045094232","https://openalex.org/W2094003855","https://openalex.org/W2135137654","https://openalex.org/W2171006634","https://openalex.org/W2218552649","https://openalex.org/W2322958931","https://openalex.org/W2325988671","https://openalex.org/W2330976657","https://openalex.org/W2472525673","https://openalex.org/W2498541372","https://openalex.org/W2511780722","https://openalex.org/W2568688225","https://openalex.org/W2649971219","https://openalex.org/W2734953419","https://openalex.org/W2752421693","https://openalex.org/W2761857866","https://openalex.org/W2766615943","https://openalex.org/W2772762260","https://openalex.org/W2787036269","https://openalex.org/W2787597139","https://openalex.org/W2789574850","https://openalex.org/W2801034885","https://openalex.org/W2963234817","https://openalex.org/W3113221786","https://openalex.org/W3125363571","https://openalex.org/W4230959423","https://openalex.org/W4243689557","https://openalex.org/W6830192751"],"related_works":["https://openalex.org/W175993441","https://openalex.org/W2018474140","https://openalex.org/W2011537374","https://openalex.org/W2144435096","https://openalex.org/W2765089333","https://openalex.org/W2050261900","https://openalex.org/W2136804115","https://openalex.org/W2156049069","https://openalex.org/W1981818465","https://openalex.org/W2109937559"],"abstract_inverted_index":{"In":[0,63,104],"this":[1],"paper,":[2],"the":[3,21,34,37,40,55,59,64,67,73,78,84,93,111,122,134,140],"secrecy":[4,94,102,141],"performance":[5],"of":[6,77,124],"cooperative":[7,125],"heterogeneous":[8],"networks":[9],"with":[10],"unreliable":[11],"backhaul":[12,128],"over":[13],"Nakagami-m":[14],"fading":[15],"channels":[16],"is":[17,27,47,52,61,70,80,115],"investigated.":[18],"To":[19,32,82],"secure":[20],"proposed":[22],"system,":[23,112],"a":[24,42],"friendly":[25],"jammer":[26],"considered":[28],"to":[29,39,106],"confuse":[30],"eavesdroppers.":[31],"transmit":[33],"signals":[35],"from":[36],"source":[38],"destination,":[41],"two-phase":[43],"transmitter/relay":[44],"selection":[45],"scheme":[46],"proposed.":[48],"The":[49,118],"best":[50,68],"transmitter":[51],"selected":[53],"when":[54,72],"signal-to-noise":[56],"ratio":[57,76],"at":[58],"relays":[60],"maximized.":[62],"second":[65],"phase,":[66],"relay":[69],"chosen":[71],"jamming":[74],"signal-to-interference-plus-noise":[75],"eavesdroppers":[79],"minimized.":[81],"investigate":[83],"system":[85,135],"performance,":[86],"closed":[87],"-form":[88],"expressions":[89],"are":[90,130],"derived":[91],"for":[92],"outage":[95],"probability,":[96],"ergodic":[97],"capacity":[98],"and":[99,127,136],"non-zero":[100],"achievable":[101],"rate.":[103],"order":[105],"gain":[107],"an":[108],"insight":[109],"into":[110],"asymptotic":[113],"analysis":[114],"also":[116],"provided.":[117],"results":[119],"show":[120],"that":[121],"degree":[123],"transmission":[126],"reliability":[129],"key":[131],"parameters":[132,138],"in":[133],"these":[137],"determine":[139],"performance.":[142]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
