{"id":"https://openalex.org/W2189096384","doi":"https://doi.org/10.1109/pimrc.2015.7343301","title":"Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation","display_name":"Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W2189096384","doi":"https://doi.org/10.1109/pimrc.2015.7343301","mag":"2189096384"},"language":"en","primary_location":{"id":"doi:10.1109/pimrc.2015.7343301","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2015.7343301","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100766772","display_name":"Ki\u2010Hong Park","orcid":"https://orcid.org/0000-0002-6867-4277"},"institutions":[{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Ki-Hong Park","raw_affiliation_strings":["Electrical Engineering Program Computer, King Abdullah University of Science and Technology (KAUST), Thuwal, Makkah Province, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Program Computer, King Abdullah University of Science and Technology (KAUST), Thuwal, Makkah Province, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I71920554"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083193286","display_name":"Mohamed\u2010Slim Alouini","orcid":"https://orcid.org/0000-0003-4827-1793"},"institutions":[{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohamed-Slim Alouini","raw_affiliation_strings":["Electrical Engineering Program Computer, King Abdullah University of Science and Technology (KAUST), Thuwal, Makkah Province, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Program Computer, King Abdullah University of Science and Technology (KAUST), Thuwal, Makkah Province, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I71920554"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100766772"],"corresponding_institution_ids":["https://openalex.org/I71920554"],"apc_list":null,"apc_paid":null,"fwci":0.50123666,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.73570266,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"27","issue":null,"first_page":"234","last_page":"238"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.8823195099830627},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.7426042556762695},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7158827185630798},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.48091647028923035},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.472647100687027},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46554574370384216},{"id":"https://openalex.org/keywords/multiplexing","display_name":"Multiplexing","score":0.44878554344177246},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.35361433029174805},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3053252398967743},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.29898345470428467},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.25376689434051514},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1384042501449585},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12186747789382935},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.10067498683929443}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.8823195099830627},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.7426042556762695},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7158827185630798},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.48091647028923035},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.472647100687027},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46554574370384216},{"id":"https://openalex.org/C19275194","wikidata":"https://www.wikidata.org/wiki/Q222903","display_name":"Multiplexing","level":2,"score":0.44878554344177246},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.35361433029174805},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3053252398967743},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.29898345470428467},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.25376689434051514},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1384042501449585},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12186747789382935},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.10067498683929443},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pimrc.2015.7343301","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2015.7343301","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.kaust.edu.sa:10754/621346","is_oa":false,"landing_page_url":"http://hdl.handle.net/10754/621346","pdf_url":null,"source":{"id":"https://openalex.org/S4306401596","display_name":"King Abdullah University of Science and Technology Repository (King Abdullah University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71920554","host_organization_name":"King Abdullah University of Science and Technology","host_organization_lineage":["https://openalex.org/I71920554"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1995875735","https://openalex.org/W2007529001","https://openalex.org/W2032278718","https://openalex.org/W2039535673","https://openalex.org/W2043769961","https://openalex.org/W2049483782","https://openalex.org/W2097480027","https://openalex.org/W2119012490","https://openalex.org/W2124071994","https://openalex.org/W2129457795","https://openalex.org/W2133406100","https://openalex.org/W2148672861","https://openalex.org/W2171006634","https://openalex.org/W2212848973","https://openalex.org/W2949672874","https://openalex.org/W6648982606"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2561242965","https://openalex.org/W2463175948","https://openalex.org/W2006290459","https://openalex.org/W2465954300","https://openalex.org/W2101042359"],"abstract_inverted_index":{"In":[0],"this":[1,121],"paper,":[2],"we":[3],"investigate":[4],"secure":[5],"transmission":[6],"in":[7,120,184],"untrusted":[8,44,69,154],"amplify-and-forward":[9],"half-duplex":[10,185],"relaying":[11,96,186],"networks":[12],"with":[13,62,73,100],"the":[14,20,24,38,43,51,56,67,80,84,91,101,106,109,113,153,158,163,170,174,208,215,218],"help":[15],"of":[16,26,95,108,134,149,165,173,181,189,203,217],"cooperative":[17],"jamming":[18,52,81,146,159],"at":[19,37,112,194,207],"destination":[21,39,59,128,209],"(CJD).":[22],"Under":[23],"assumption":[25],"full":[27,92],"channel":[28,204],"state":[29],"information":[30],"(CSI),":[31],"conventional":[32,102,190],"CJD":[33,103,124,191],"using":[34],"self-interference":[35,150],"cancelation":[36,142],"is":[40,71,192,210],"efficient":[41],"when":[42],"relay":[45,70,130,155],"has":[46],"no":[47],"capability":[48],"to":[49,105,162,213],"suppress":[50,157],"signal.":[53],"However,":[54],"if":[55],"source":[57],"and":[58,66,90],"are":[60],"equipped":[61,72],"a":[63,179],"single":[64],"antenna":[65],"only":[68],"N":[74,199],"multiple":[75],"antennas,":[76],"it":[77],"can":[78,131,177],"remove":[79],"signal":[82,86],"from":[83],"received":[85],"by":[87],"linear":[88],"filters":[89],"multiplexing":[93,182],"gain":[94,183],"cannot":[97,156],"be":[98],"achievable":[99],"due":[104,161],"saturation":[107],"secrecy":[110,171],"rate":[111,172],"high":[114,195],"transmit":[115,196],"power":[116,197],"regime.":[117],"We":[118,167],"propose":[119],"paper":[122],"new":[123],"scheme":[125,139,176,220],"where":[126],"neither":[127],"nor":[129],"acquire":[132],"CSI":[133],"relay-destination":[135],"link.":[136],"Our":[137],"proposed":[138,175,219],"utilizes":[140],"zero-forcing":[141],"based":[143],"on":[144],"known":[145],"signals":[147,160],"instead":[148],"subtraction,":[151],"while":[152,187],"lack":[164],"CSI.":[166],"show":[168,214],"that":[169,188],"enjoy":[178],"half":[180],"saturated":[193],"for":[198],"???2.":[200],"The":[201],"impact":[202],"estimation":[205,223],"error":[206],"also":[211],"investigated":[212],"robustness":[216],"against":[221],"strong":[222],"errors.":[224]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
