0 Datasets
0 Files
Get instant academic access to this publication’s datasets.
Yes. After verification, you can browse and download datasets at no cost. Some premium assets may require author approval.
Files are stored on encrypted storage. Access is restricted to verified users and all downloads are logged.
Yes, message the author after sign-up to request supplementary files or replication code.
Join 50,000+ researchers worldwide. Get instant access to peer-reviewed datasets, advanced analytics, and global collaboration tools.
✓ Immediate verification • ✓ Free institutional access • ✓ Global collaborationJoin our academic network to download verified datasets and collaborate with researchers worldwide.
Get Free AccessWe assume a full-duplex (FD) cooperative network subject to hostile attacks and undergoing composite fading channels. We focus on two scenarios: \textit{a)} the transmitter has full CSI, for which we derive closed-form expressions for the \textit{average secrecy rate}; and \textit{b)} the transmitter only knows the CSI of the legitimate nodes, for which we obtain closed-form expressions for the \textit{secrecy outage probability}. We show that secure FD relaying is feasible, even under strong self-interference and in the presence of sophisticated multiple antenna eavesdropper.
Hirley Alves, Glauber Brante, Richard D’Souza, Daniel B. da Costa, Matti Latva-aho, Hirley Alves, Glauber Brante, Richard D’Souza, Daniel B. da Costa, Matti Latva-aho (2014). On the Performance of Secure Full-Duplex Relaying under Composite Fading Channels. , 22(7), DOI: https://doi.org/10.1109/lsp.2014.2374994.
Datasets shared by verified academics with rich metadata and previews.
Authors choose access levels; downloads are logged for transparency.
Students and faculty get instant access after verification.
Type
Article
Year
2014
Authors
10
Datasets
0
Total Files
0
Language
en
DOI
https://doi.org/10.1109/lsp.2014.2374994
Access datasets from 50,000+ researchers worldwide with institutional verification.
Get Free Access