{"id":"https://openalex.org/W2089112487","doi":"https://doi.org/10.1109/tpds.2014.2316155","title":"Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs","display_name":"Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs","publication_year":2014,"publication_date":"2014-04-08","ids":{"openalex":"https://openalex.org/W2089112487","doi":"https://doi.org/10.1109/tpds.2014.2316155","mag":"2089112487"},"language":"en","primary_location":{"id":"doi:10.1109/tpds.2014.2316155","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpds.2014.2316155","pdf_url":null,"source":{"id":"https://openalex.org/S97130795","display_name":"IEEE Transactions on Parallel and Distributed Systems","issn_l":"1045-9219","issn":["1045-9219","1558-2183","2161-9883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Parallel and Distributed Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108112607","display_name":"Biao Han","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Biao Han","raw_affiliation_strings":["School of Computer, National University of Defense Technology, China","[School of Computer, National University of Defense Technology, China.]"],"affiliations":[{"raw_affiliation_string":"School of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"[School of Computer, National University of Defense Technology, China.]","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100679241","display_name":"Jie Li","orcid":"https://orcid.org/0000-0002-4974-6116"},"institutions":[{"id":"https://openalex.org/I146399215","display_name":"University of Tsukuba","ror":"https://ror.org/02956yf07","country_code":"JP","type":"education","lineage":["https://openalex.org/I146399215"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Jie Li","raw_affiliation_strings":["Faculty of Engineering, Information and Systems, University of Tsukuba, Tsukuba Science City, Ibaraki 305-8573, Japan","Faculty of Engineering, Information and Systems University of Tsukuba Tsukuba Science City Ibaraki 305\u20108573 Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Information and Systems, University of Tsukuba, Tsukuba Science City, Ibaraki 305-8573, Japan","institution_ids":["https://openalex.org/I146399215"]},{"raw_affiliation_string":"Faculty of Engineering, Information and Systems University of Tsukuba Tsukuba Science City Ibaraki 305\u20108573 Japan","institution_ids":["https://openalex.org/I146399215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055375948","display_name":"Jinshu Su","orcid":"https://orcid.org/0000-0001-9273-616X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinshu Su","raw_affiliation_strings":["School of Computer, National University of Defense Technology, China","[School of Computer, National University of Defense Technology, China.]"],"affiliations":[{"raw_affiliation_string":"School of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"[School of Computer, National University of Defense Technology, China.]","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039318240","display_name":"Minyi Guo","orcid":"https://orcid.org/0000-0003-0034-2302"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minyi Guo","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China","Department of computer science and engineering,Shanghai Jiao Tong University,Shanghai 200240,China)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Department of computer science and engineering,Shanghai Jiao Tong University,Shanghai 200240,China)","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055202882","display_name":"Baokang Zhao","orcid":"https://orcid.org/0000-0001-9200-9018"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baokang Zhao","raw_affiliation_strings":["School of Computer, National University of Defense Technology, China","[School of Computer, National University of Defense Technology, China.]"],"affiliations":[{"raw_affiliation_string":"School of Computer, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"[School of Computer, National University of Defense Technology, China.]","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5108112607"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":5.517,"has_fulltext":false,"cited_by_count":62,"citation_normalized_percentile":{"value":0.96195957,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"26","issue":"4","first_page":"1117","last_page":"1128"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8555020093917847},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.803132176399231},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.7998912930488586},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6892316341400146},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6874675154685974},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6811748743057251},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.671696662902832},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.5748404860496521},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5128265023231506},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.43528956174850464},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.43087637424468994},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3805188536643982},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3095141053199768},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1476391851902008}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8555020093917847},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.803132176399231},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7998912930488586},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6892316341400146},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6874675154685974},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6811748743057251},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.671696662902832},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.5748404860496521},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5128265023231506},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.43528956174850464},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43087637424468994},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3805188536643982},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3095141053199768},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1476391851902008},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tpds.2014.2316155","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpds.2014.2316155","pdf_url":null,"source":{"id":"https://openalex.org/S97130795","display_name":"IEEE Transactions on Parallel and Distributed Systems","issn_l":"1045-9219","issn":["1045-9219","1558-2183","2161-9883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Parallel and Distributed Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1414087767","display_name":null,"funder_award_id":"61373156","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4230351185","display_name":null,"funder_award_id":"61202488","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7921824359","display_name":null,"funder_award_id":"12JC1405400","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"},{"id":"https://openalex.org/G8235908060","display_name":null,"funder_award_id":"91438121","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321885","display_name":"Science and Technology Commission of Shanghai Municipality","ror":"https://ror.org/03kt66j61"},{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W104650325","https://openalex.org/W141789587","https://openalex.org/W1479863711","https://openalex.org/W1518982645","https://openalex.org/W1979833275","https://openalex.org/W1984290911","https://openalex.org/W2008561659","https://openalex.org/W2027735696","https://openalex.org/W2028974285","https://openalex.org/W2043769961","https://openalex.org/W2057675521","https://openalex.org/W2079364662","https://openalex.org/W2094917288","https://openalex.org/W2098360731","https://openalex.org/W2101371787","https://openalex.org/W2102654676","https://openalex.org/W2111398884","https://openalex.org/W2114520880","https://openalex.org/W2114870603","https://openalex.org/W2120073444","https://openalex.org/W2126477936","https://openalex.org/W2128153585","https://openalex.org/W2129457795","https://openalex.org/W2132757565","https://openalex.org/W2139825184","https://openalex.org/W2142102521","https://openalex.org/W2144007657","https://openalex.org/W2152121970","https://openalex.org/W2153472136","https://openalex.org/W2168566523","https://openalex.org/W2171006634","https://openalex.org/W2495701169","https://openalex.org/W2542429611","https://openalex.org/W2611093107","https://openalex.org/W3141776272","https://openalex.org/W4243079849","https://openalex.org/W6674334688","https://openalex.org/W6729286676"],"related_works":["https://openalex.org/W2583302477","https://openalex.org/W2147858283","https://openalex.org/W2805060110","https://openalex.org/W2050512755","https://openalex.org/W4296709053","https://openalex.org/W2982964493","https://openalex.org/W2963791781","https://openalex.org/W4313895184","https://openalex.org/W3094163253","https://openalex.org/W2089112487"],"abstract_inverted_index":{"Cooperative":[0],"wireless":[1,58],"networking,":[2],"which":[3,90],"is":[4,93],"promising":[5],"in":[6,29,89,144],"improving":[7],"the":[8,32,73,77,84,132,150,156,168,182],"system":[9,78,105,151,183],"operation":[10],"efficiency":[11],"and":[12,18,68,98,136,160],"reliability":[13],"by":[14,79,116],"acquiring":[15],"more":[16],"accurate":[17],"timely":[19],"information,":[20],"has":[21,38],"attracted":[22],"considerable":[23],"attentions":[24],"to":[25,52,120,141,166],"support":[26],"many":[27],"services":[28],"practice.":[30],"However,":[31],"problem":[33,88,135],"of":[34,76,110],"secure":[35,54],"cooperative":[36,55,96,99,157],"communication":[37,56],"not":[39],"been":[40],"well":[41],"investigated":[42],"yet.":[43],"In":[44],"this":[45],"paper,":[46],"we":[47,82,102,154,174],"exploit":[48,155],"physical":[49,122],"layer":[50,123],"security":[51,74,91],"provide":[53],"for":[57,131],"ad":[59],"hoc":[60],"networks":[61],"(WANETs)":[62],"where":[63,107],"involve":[64],"multiple":[65,117],"source-destination":[66,118],"pairs":[67,119],"malicious":[69],"eavesdroppers.":[70],"By":[71],"characterizing":[72],"performance":[75],"secrecy":[80,85,152,184],"capacity,":[81,153],"study":[83],"capacity":[86,185],"optimization":[87],"enhancement":[92],"achieved":[94],"via":[95],"relaying":[97],"jamming.":[100],"Specifically,":[101],"propose":[103,161],"a":[104,108,128,162],"model":[106],"set":[109],"relay":[111,133],"nodes":[112],"can":[113],"be":[114],"exploited":[115],"achieve":[121],"security.":[124],"We":[125],"theoretically":[126],"present":[127],"corresponding":[129],"formulation":[130],"assignment":[134],"develop":[137],"an":[138],"optimal":[139],"algorithm":[140,165],"solve":[142],"it":[143],"polynomial":[145],"time.":[146],"To":[147],"further":[148],"increase":[149,181],"jamming":[158,164],"technique":[159],"smart":[163],"interfere":[167],"eavesdropping":[169],"channels.":[170],"Through":[171],"extensive":[172],"experiments,":[173],"validate":[175],"that":[176],"our":[177],"proposed":[178],"algorithms":[179],"significantly":[180],"under":[186],"various":[187],"network":[188],"settings.":[189]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
