{"id":"https://openalex.org/W2896696796","doi":"https://doi.org/10.1109/iscisc.2017.8488378","title":"Physical Layer Security in AF and CF Relay Networks with RF-Energy Harvesting","display_name":"Physical Layer Security in AF and CF Relay Networks with RF-Energy Harvesting","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2896696796","doi":"https://doi.org/10.1109/iscisc.2017.8488378","mag":"2896696796"},"language":"en","primary_location":{"id":"doi:10.1109/iscisc.2017.8488378","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc.2017.8488378","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015161209","display_name":"Ali Soleimani","orcid":"https://orcid.org/0000-0001-8878-4046"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Ali Soleimani","raw_affiliation_strings":["Information Systems and Security Lab (ISSL), Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Information Systems and Security Lab (ISSL), Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035804797","display_name":"Mahtab Mirmohseni","orcid":"https://orcid.org/0000-0002-5247-5820"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mahtab Mirmohseni","raw_affiliation_strings":["Information Systems and Security Lab (ISSL), Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Information Systems and Security Lab (ISSL), Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028840314","display_name":"Mohammad Reza Aref","orcid":"https://orcid.org/0000-0002-4321-0345"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Reza Aref","raw_affiliation_strings":["Information Systems and Security Lab (ISSL), Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Information Systems and Security Lab (ISSL), Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015161209"],"corresponding_institution_ids":["https://openalex.org/I133529467"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22226983,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"86","last_page":"92"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.915313720703125},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.9059154987335205},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7226030826568604},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7191760540008545},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6716857552528381},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.595773458480835},{"id":"https://openalex.org/keywords/relay-channel","display_name":"Relay channel","score":0.5874226689338684},{"id":"https://openalex.org/keywords/energy-harvesting","display_name":"Energy harvesting","score":0.5814759731292725},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.5706140995025635},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.5640618801116943},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5541352033615112},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.4888693690299988},{"id":"https://openalex.org/keywords/transmitter-power-output","display_name":"Transmitter power output","score":0.46739324927330017},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.45264509320259094},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.44190725684165955},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.4101405739784241},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3507683575153351},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2644006609916687},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1431378722190857},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12569180130958557},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08120235800743103}],"concepts":[{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.915313720703125},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.9059154987335205},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7226030826568604},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7191760540008545},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6716857552528381},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.595773458480835},{"id":"https://openalex.org/C46257984","wikidata":"https://www.wikidata.org/wiki/Q7310895","display_name":"Relay channel","level":4,"score":0.5874226689338684},{"id":"https://openalex.org/C101518730","wikidata":"https://www.wikidata.org/wiki/Q930236","display_name":"Energy harvesting","level":3,"score":0.5814759731292725},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.5706140995025635},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.5640618801116943},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5541352033615112},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.4888693690299988},{"id":"https://openalex.org/C65422117","wikidata":"https://www.wikidata.org/wiki/Q358527","display_name":"Transmitter power output","level":4,"score":0.46739324927330017},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.45264509320259094},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.44190725684165955},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.4101405739784241},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3507683575153351},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2644006609916687},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1431378722190857},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12569180130958557},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08120235800743103},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscisc.2017.8488378","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc.2017.8488378","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8999999761581421,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1515073954","https://openalex.org/W1966000877","https://openalex.org/W1970578484","https://openalex.org/W2043769961","https://openalex.org/W2097480027","https://openalex.org/W2137552535","https://openalex.org/W2142022446","https://openalex.org/W2368975782","https://openalex.org/W2403652205","https://openalex.org/W2561594650","https://openalex.org/W2569395685","https://openalex.org/W2962874228","https://openalex.org/W6678727700","https://openalex.org/W6730586943"],"related_works":["https://openalex.org/W2972424885","https://openalex.org/W2104478100","https://openalex.org/W2107866095","https://openalex.org/W1680452241","https://openalex.org/W2051457655","https://openalex.org/W2097805107","https://openalex.org/W2561179371","https://openalex.org/W3092569272","https://openalex.org/W2551856726","https://openalex.org/W3193292754"],"abstract_inverted_index":{"In":[0,178],"this":[1],"paper,":[2],"we":[3,57,162,174,180],"investigate":[4],"the":[5,14,17,22,55,65,73,76,88,91,96,103,115,123,129,136,145,150,164,167,182,187,190,213,239],"achievable":[6,146],"secrecy":[7,70,130,147,208],"rate":[8,209],"in":[9],"a":[10,206,222],"relay":[11,28,32,89,97,183],"channel":[12],"where":[13],"source":[15],"and":[16,37,75,153,166,189,215,230],"destination":[18,137,165],"wish":[19],"to":[20,101,105,108,111,118,121,127,184,194],"keep":[21],"information":[23,116],"confidential":[24],"from":[25,44],"an":[26,82,139,235],"untrusted":[27,83],"(potential":[29],"eavesdropper).":[30],"The":[31],"has":[33],"no":[34],"energy":[35,41,113],"supply,":[36],"harvests":[38],"its":[39,45],"required":[40],"for":[42,149,157,221,238],"relaying":[43],"received":[46],"signals.":[47],"For":[48],"radio-frequency":[49],"(RF)":[50],"Energy":[51,85],"Harvesting":[52],"(EH)":[53],"at":[54,87],"relay,":[56],"adopt":[58],"power":[59,224],"splitting":[60],"(PS)":[61],"approach.":[62],"We":[63,143],"study":[64],"problem":[66,92],"of":[67,81],"achieving":[68],"positive":[69,207],"rates":[71,148],"between":[72],"transmitter":[74],"receiver":[77],"while":[78],"making":[79],"use":[80,185],"relay.":[84],"limitation":[86],"makes":[90],"more":[93],"interesting.":[94],"Because,":[95],"must":[98],"choose":[99],"either":[100,135],"eavesdrop":[102],"signal":[104],"be":[106,119],"able":[107,120],"decode":[109],"or":[110,138],"harvest":[112,195],"(from":[114],"signal)":[117],"forward":[122],"message.":[124],"Our":[125,197],"scheme":[126],"guarantee":[128,205],"uses":[131],"cooperative":[132],"jamming":[133,218,231,240],"by":[134,210],"extra":[140],"jammer":[141,168,214],"node.":[142],"derive":[144],"compress-and-forward":[151],"(CF)":[152],"amplify-and-forward":[154],"(AF)":[155],"relays":[156],"two":[158,170],"different":[159],"scenarios.":[160],"First,":[161],"assume":[163],"are":[169],"separate":[171],"nodes.":[172],"Then,":[173],"consider":[175],"destination-assisted":[176],"jamming.":[177],"addition,":[179],"let":[181],"both":[186],"sources":[188],"jammers":[191],"transmitted":[192],"signals":[193],"energy.":[196],"numerical":[198],"results":[199],"show":[200],"that":[201],"our":[202],"proposed":[203],"schemes":[204],"properly":[211],"locating":[212],"allocating":[216],"enough":[217],"power.":[219,241],"However,":[220],"given":[223],"budget":[225],"(i.e.,":[226],"fixed":[227],"total":[228],"transmission":[229],"power)":[232],"there":[233],"is":[234],"optimum":[236],"amount":[237]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
