{"id":"https://openalex.org/W2088654965","doi":"https://doi.org/10.1109/jcn.2012.6292242","title":"Secure communication in multiple relay networks through decode-and-forward strategies","display_name":"Secure communication in multiple relay networks through decode-and-forward strategies","publication_year":2012,"publication_date":"2012-08-01","ids":{"openalex":"https://openalex.org/W2088654965","doi":"https://doi.org/10.1109/jcn.2012.6292242","mag":"2088654965"},"language":"en","primary_location":{"id":"doi:10.1109/jcn.2012.6292242","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jcn.2012.6292242","pdf_url":null,"source":{"id":"https://openalex.org/S173102057","display_name":"Journal of Communications and Networks","issn_l":"1229-2370","issn":["1229-2370","1976-5541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications and Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009609755","display_name":"Raef Bassily","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Raef Bassily","raw_affiliation_strings":["Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA 16802, USA","Department of Computer Science and Engineering Pennsylvania State University  University Park PA USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA 16802, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Department of Computer Science and Engineering Pennsylvania State University  University Park PA USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021132487","display_name":"\u015eennur Uluku\u015f","orcid":"https://orcid.org/0000-0002-8219-8190"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sennur Ulukus","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742, USA","Dept of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742, USA","institution_ids":["https://openalex.org/I66946132"]},{"raw_affiliation_string":"Dept of Electr. & Comput. Eng., Univ. of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009609755"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":3.9944,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.94142511,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"14","issue":"4","first_page":"352","last_page":"363"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.8670411705970764},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8218752145767212},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6289330124855042},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5273498296737671},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.41486018896102905},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.2946031093597412},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11855611205101013}],"concepts":[{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.8670411705970764},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8218752145767212},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6289330124855042},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5273498296737671},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.41486018896102905},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2946031093597412},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11855611205101013},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jcn.2012.6292242","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jcn.2012.6292242","pdf_url":null,"source":{"id":"https://openalex.org/S173102057","display_name":"Journal of Communications and Networks","issn_l":"1229-2370","issn":["1229-2370","1976-5541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications and Networks","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.299.8895","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.8895","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ece.umd.edu/~ulukus/papers/journal/df-based-security-relay-network.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W52732363","https://openalex.org/W98812071","https://openalex.org/W1542912112","https://openalex.org/W1640197322","https://openalex.org/W1987034598","https://openalex.org/W1989840033","https://openalex.org/W2072563372","https://openalex.org/W2082032136","https://openalex.org/W2091550021","https://openalex.org/W2097480027","https://openalex.org/W2098567664","https://openalex.org/W2099111195","https://openalex.org/W2104562009","https://openalex.org/W2112967760","https://openalex.org/W2115613211","https://openalex.org/W2116892602","https://openalex.org/W2120073444","https://openalex.org/W2129457795","https://openalex.org/W2132100261","https://openalex.org/W2133406100","https://openalex.org/W2136812100","https://openalex.org/W2141168001","https://openalex.org/W2142102521","https://openalex.org/W2159437533","https://openalex.org/W2167447263","https://openalex.org/W2542429611","https://openalex.org/W2953269090","https://openalex.org/W3103382732","https://openalex.org/W6729286676"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2016567611","https://openalex.org/W2493929861","https://openalex.org/W2475541339","https://openalex.org/W2107199751","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W4300441478","https://openalex.org/W2062965938","https://openalex.org/W99756173"],"abstract_inverted_index":{"In":[0,151],"this":[1,49,219],"paper,":[2],"we":[3,106,114,155],"study":[4,83,242],"the":[5,32,68,84,108,116,143,152,164,168,174,181,189,192,197,212,226,233,236,251,256,262],"role":[6],"of":[7,48,191,199,235,246,253,255,261],"cooperative":[8],"relays":[9],"to":[10,60,71,161,249],"provide":[11,72],"and":[12,40,73,128,225],"improve":[13,74],"secure":[14],"communication":[15],"rates":[16,264],"through":[17],"decode-and-forward":[18],"(DF)":[19],"strategies":[20,43,124,146,258],"in":[21,76,89,218,259,265],"a":[22,36,77,90,96,138,208,244],"full-duplex":[23],"multiple":[24,55,78,117,148],"relay":[25,79,92,118],"network":[26],"with":[27,54,99,196],"an":[28,62],"eavesdropper.":[29],"We":[30,81,94,120,239],"consider":[31,115],"DF":[33,69,85,98],"scheme":[34,50,70],"as":[35],"basis":[37],"for":[38,52,87,104],"cooperation":[39,53,64],"propose":[41,95,121],"several":[42],"that":[44,157],"implement":[45],"different":[46,123,266],"versions":[47],"suited":[51],"relays.":[56],"Our":[57,185,204],"goal":[58],"is":[59,137,159,178,223],"give":[61],"efficient":[63],"paradigm":[65],"based":[66,125],"on":[67,126],"secrecy":[75,88,132,176],"network.":[80,93],"first":[82,135,153,193,213,237],"strategy":[86,103,136,141,187,206],"single":[91,139],"suboptimal":[97],"zero":[100],"forcing":[101],"(DF/ZF)":[102],"which":[105],"obtain":[107,129],"optimal":[109],"power":[110],"control":[111],"policy.":[112],"Next,":[113],"problem.":[119],"three":[122],"DF/ZF":[127],"their":[130],"achievable":[131,175,263],"rates.":[133],"The":[134],"hop":[140,149],"whereas":[142],"other":[144],"two":[145,214],"are":[147],"strategies.":[150,215],"strategy,":[154,194,220],"show":[156],"it":[158],"possible":[160,224],"eliminate":[162],"all":[163],"relays'":[165],"signals":[166],"from":[167,232],"eavesdropper's":[169],"observation":[170],"(full":[171],"ZF),":[172],"however,":[173,195],"rate":[177,227],"limited":[179],"by":[180,243],"worst":[182],"source-relay":[183],"channel.":[184],"second":[186],"overcomes":[188],"drawback":[190,234],"disadvantage":[198],"enabling":[200],"partial":[201],"ZF":[202,222],"only.":[203],"third":[205],"provides":[207],"reasonable":[209],"compromise":[210],"between":[211],"That":[216],"is,":[217],"full":[221],"achieved":[228],"does":[229],"not":[230],"suffer":[231],"strategy.":[238],"conclude":[240],"our":[241],"set":[245],"numerical":[247],"results":[248],"illustrate":[250],"performance":[252],"each":[254],"proposed":[257],"terms":[260],"practical":[267],"scenarios.":[268]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
