{"id":"https://openalex.org/W2886271751","doi":"https://doi.org/10.1109/icc.2018.8422287","title":"On the Secure Degrees of Freedom of 2 x 2 x 2 Multi-Hop Network with Untrusted Relays","display_name":"On the Secure Degrees of Freedom of 2 x 2 x 2 Multi-Hop Network with Untrusted Relays","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2886271751","doi":"https://doi.org/10.1109/icc.2018.8422287","mag":"2886271751"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2018.8422287","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422287","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032121958","display_name":"Mohamed Seif","orcid":"https://orcid.org/0000-0002-7034-5851"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohamed Seif","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004316408","display_name":"Ravi Tandon","orcid":"https://orcid.org/0000-0002-6182-6098"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ravi Tandon","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100351421","display_name":"Ming Li","orcid":"https://orcid.org/0000-0002-4073-0273"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ming Li","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032121958"],"corresponding_institution_ids":["https://openalex.org/I138006243"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07434135,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8569881916046143},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7242817878723145},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.7230942845344543},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6702462434768677},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5761752128601074},{"id":"https://openalex.org/keywords/hop","display_name":"Hop (telecommunications)","score":0.5564782023429871},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.4772377014160156},{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.47033271193504333},{"id":"https://openalex.org/keywords/single-antenna-interference-cancellation","display_name":"Single antenna interference cancellation","score":0.4514939486980438},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4335589110851288},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4160262942314148},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.4143190383911133},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.27433258295059204},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.22513699531555176},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10698020458221436},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.0842885673046112}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8569881916046143},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7242817878723145},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.7230942845344543},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6702462434768677},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5761752128601074},{"id":"https://openalex.org/C25906391","wikidata":"https://www.wikidata.org/wiki/Q1432381","display_name":"Hop (telecommunications)","level":2,"score":0.5564782023429871},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.4772377014160156},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.47033271193504333},{"id":"https://openalex.org/C83204339","wikidata":"https://www.wikidata.org/wiki/Q7523915","display_name":"Single antenna interference cancellation","level":3,"score":0.4514939486980438},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4335589110851288},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4160262942314148},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.4143190383911133},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.27433258295059204},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.22513699531555176},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10698020458221436},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0842885673046112},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2018.8422287","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422287","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1966317963","https://openalex.org/W1979408141","https://openalex.org/W1995808001","https://openalex.org/W2043769961","https://openalex.org/W2079525500","https://openalex.org/W2108850836","https://openalex.org/W2109962983","https://openalex.org/W2136608712","https://openalex.org/W2137552535","https://openalex.org/W2144007657","https://openalex.org/W2198274882","https://openalex.org/W2585586992"],"related_works":["https://openalex.org/W2519669146","https://openalex.org/W2786811319","https://openalex.org/W2972651196","https://openalex.org/W3134459480","https://openalex.org/W4391496545","https://openalex.org/W2321395681","https://openalex.org/W4388426441","https://openalex.org/W4360605174","https://openalex.org/W4285103104","https://openalex.org/W3022352698"],"abstract_inverted_index":{"We":[0,88],"study":[1],"the":[2,8,21,42,57,61,68,81,85,92,98,115,128,142,164,173,188,194,202,236,243,248,256,279,307,314],"impact":[3],"of":[4,10,12,44,55,105,109,118,122,131,145,190,223,242,245,282,309],"untrusted":[5,46,52,133,143,323],"relays":[6,49,324],"on":[7,213,235,261,289,317],"degrees":[9,117],"freedom":[11,119],"multi-antenna":[13],"multi-hop":[14,124,318],"networks.":[15],"In":[16],"par-":[17],"ticular,":[18],"we":[19,64,147,208,230,251],"consider":[20],"two":[22,28,45,129,253],"user":[23],"two-hop":[24],"interference":[25,191,214,217,263],"network,":[26],"where":[27],"source":[29],"nodes":[30],"want":[31],"to":[32,37,79,113,186,197,270,298],"send":[33],"independent":[34],"messages":[35,58,69],"securely":[36],"their":[38,156],"designated":[39],"receivers":[40],"through":[41],"help":[43],"relays.":[47],"The":[48,107,220],"are":[50,70,100,169,226,313],"considered":[51],"in":[53,151,172,193],"terms":[54],"eavesdropping":[56],"sent":[59],"by":[60],"sources.":[62],"Moreover,":[63],"also":[65],"assume":[66,89],"that":[67,90,163],"confidential,":[71],"i.e.,":[72],"each":[73,167],"receiver":[74],"must":[75,180],"not":[76],"be":[77,181,271,299],"able":[78],"decode":[80],"information":[82,157,272],"meant":[83],"for":[84,301],"other":[86],"receiver.":[87],"all":[91,276],"terminals":[93,277],"(i.e.,":[94],"sources,":[95],"relays,":[96,146],"and":[97,135,216,265,267,284,293,325],"receivers)":[99],"equipped":[101],"with":[102,141,159,322],"multiple":[103],"number":[104,244,281],"antennas.":[106],"goal":[108],"this":[110,123,178,206,224],"work":[111,225],"is":[112,259,268,296],"understand":[114],"secure":[116,262,290],"(SDoF)":[120],"region":[121,238],"MIMO":[125,319],"network":[126],"under":[127],"constraints":[130],"a)":[132,229],"relays;":[134],"b)":[136,250],"confidential":[137,326],"messages.":[138,327],"To":[139,205,306],"cope":[140],"nature":[144],"present":[148,231,252],"achievable":[149,254],"schemes":[150,211],"which":[152,295],"both":[153],"sources":[154],"mix":[155],"symbols":[158],"artificial":[160,174],"noises":[161,175],"so":[162,184],"signals":[165],"at":[166,201,247],"relay":[168,320],"completely":[170],"immersed":[171],"space.":[176],"However,":[177],"mixing":[179],"done":[182],"carefully,":[183],"as":[185,227,239],"ensure":[187],"feasibility":[189],"neutralization":[192,218,266],"second":[195,286],"hop":[196],"allow":[198],"successful":[199],"decoding":[200],"respective":[203],"destination.":[204],"end,":[207],"devise":[209],"transmission":[210],"based":[212,260,288],"alignment":[215,264,292],"techniques.":[219],"main":[221],"contributions":[222],"follows:":[228],"an":[232],"upper":[233],"bound":[234],"SDoF":[237],"a":[240,285],"function":[241],"antennas":[246],"terminals,":[249],"schemes,":[255],"first":[257,315],"scheme":[258],"shown":[269,297],"theoretically":[273],"optimal":[274,300],"when":[275],"have":[278],"same":[280],"antennas;":[283],"scheme,":[287],"sub-space":[291],"neutralization,":[294],"another":[302],"specific":[303],"antenna":[304],"configuration.":[305],"best":[308],"our":[310],"knowledge,":[311],"these":[312],"results":[316],"networks":[321]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
