{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:32:58Z","timestamp":1726043578910},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030301484"},{"type":"electronic","value":"9783030301491"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30149-1_6","type":"book-chapter","created":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T19:02:54Z","timestamp":1567623774000},"page":"65-80","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secrecy Performance Enhancement Using Path Selection over Cluster-Based Cognitive Radio Networks"],"prefix":"10.1007","author":[{"given":"Pham Minh","family":"Nam","sequence":"first","affiliation":[]},{"given":"Phan","family":"Van Ca","sequence":"additional","affiliation":[]},{"given":"Tran Trung","family":"Duy","sequence":"additional","affiliation":[]},{"given":"Khoa N.","family":"Le","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,17]]},"reference":[{"issue":"10","key":"6_CR1","doi-asserted-by":"publisher","first-page":"4687","DOI":"10.1109\/TIT.2008.928990","volume":"54","author":"PK Gopala","year":"2008","unstructured":"Gopala, P.K., Lai, L., Gamal, H.E.: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 54(10), 4687\u20134698 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"6_CR2","doi-asserted-by":"publisher","first-page":"420","DOI":"10.3390\/e19080420","volume":"19","author":"J Zhang","year":"2017","unstructured":"Zhang, J., Duong, T.Q., Woods, R., Marshall, A.: Securing wireless communications of the internet of things from the physical layer. Overv. Entropy 19(8), 420 (2017)","journal-title":"Overv. Entropy"},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/TCOMM.2012.12.110670","volume":"61","author":"N Yang","year":"2013","unstructured":"Yang, N., Yeoh, P.L., Elkashlan, M., Schober, R., Collings, I.B.: Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans. Commun. 61(1), 144\u2013154 (2013)","journal-title":"IEEE Trans. Commun."},{"issue":"8","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/TIFS.2015.2421358","volume":"10","author":"J Xiong","year":"2015","unstructured":"Xiong, J., Tang, Y., Ma, D., Xiao, P., Wong, K.-K.: Secrecy performance analysis for TAS-MRC system with imperfect feedback. IEEE Trans. Inf. Forensics Secur. 10(8), 1617\u20131629 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/TCOMM.2017.2747554","volume":"66","author":"R Zhao","year":"2018","unstructured":"Zhao, R., Lin, H., He, Y.-C., Chen, D.-H., Huang, Y., Yang, L.: Secrecy performance of transmit antenna selection for MIMO relay systems with outdated CSI. IEEE Trans. Commun. 66(2), 546\u2013559 (2018)","journal-title":"IEEE Trans. Commun."},{"issue":"15","key":"6_CR6","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.1049\/iet-com.2009.0634","volume":"4","author":"I Krikidis","year":"2010","unstructured":"Krikidis, I.: Opportunistic relay selection for cooperative networks with secrecy constraints. IET Commun. 4(15), 1787\u20131791 (2010)","journal-title":"IET Commun."},{"issue":"12","key":"6_CR7","doi-asserted-by":"publisher","first-page":"8009","DOI":"10.1109\/TWC.2016.2610965","volume":"15","author":"M Yang","year":"2016","unstructured":"Yang, M., Guo, D., Huang, Y., Duong, T.Q., Zhang, B.: Secure multiuser scheduling in downlink dual-hop regenerative relay networks over Nakagami-m fading channels. IEEE Trans. Wirel. Commun. 15(12), 8009\u20138024 (2016)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"9","key":"6_CR8","doi-asserted-by":"publisher","first-page":"1882","DOI":"10.1109\/LCOMM.2018.2853101","volume":"22","author":"L Qing","year":"2018","unstructured":"Qing, L., Guangyao, H., Xiaomei, F.: Physical layer security in multi-hop AF relay network based on compressed sensing. IEEE Commun. Lett. 22(9), 1882\u20131885 (2018)","journal-title":"IEEE Commun. Lett."},{"issue":"2","key":"6_CR9","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/LWC.2017.2650224","volume":"6","author":"TM Hoang","year":"2017","unstructured":"Hoang, T.M., Duong, T.Q., Vo, N.-S., Kundu, C.: Physical layer security in cooperative energy harvesting networks with a friendly jammer. IEEE Wirel. Commun. Lett. 6(2), 174\u2013177 (2017)","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"2","key":"6_CR10","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TCOMM.2017.2765637","volume":"66","author":"H Ma","year":"2018","unstructured":"Ma, H., Cheng, J., Wang, X., Ma, P.: Robust MISO beamforming with cooperative jamming for secure transmission from perspectives of QoS and secrecy rate. IEEE Trans. Commun. 66(2), 767\u2013780 (2018)","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"6_CR11","doi-asserted-by":"publisher","first-page":"2505","DOI":"10.1007\/s11277-015-2361-y","volume":"82","author":"TT Duy","year":"2015","unstructured":"Duy, T.T., Kong, H.Y.: Secrecy performance analysis of multihop transmission protocols in cluster networks. Wirel. Pers. Commun. 82(4), 2505\u20132518 (2015)","journal-title":"Wirel. Pers. Commun."},{"key":"6_CR12","first-page":"769","volume-title":"AETA 2016: Recent Advances in Electrical Engineering and Related Sciences","author":"Phu Tran Tin","year":"2016","unstructured":"Tin, P.T., Duy, T.T., Phuong, T.T., Voznak, M.: Secrecy performance of joint relay and jammer selection methods in cluster networks: with and without hardware noises. In: International Conference on Advanced Engineering - Theory and Applications, Busan, pp. 769\u2013779 (2016)"},{"issue":"4","key":"6_CR13","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/LCOMM.2015.2401551","volume":"19","author":"J-H Lee","year":"2015","unstructured":"Lee, J.-H.: Full-duplex relay for enhancing physical layer security in multi-hop relaying systems. IEEE Commun. Lett. 19(4), 525\u2013528 (2015)","journal-title":"IEEE Commun. Lett."},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"1216","DOI":"10.1109\/TWC.2018.2890609","volume":"18","author":"S Atapattu","year":"2019","unstructured":"Atapattu, S., Ross, N., Jing, Y., He, Y., Evans, J.S.: Physical-layer security in full-duplex multi-hop multi-user wireless network with relay selection. IEEE Trans. Wirel. Commun. 18(2), 1216\u20131232 (2019)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/LWC.2014.2365808","volume":"4","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Wang, L., Duy, T.T., Elkashlan, M., Duong, T.Q.: Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett. 4(1), 46\u201349 (2015)","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"11","key":"6_CR16","doi-asserted-by":"publisher","first-page":"2609","DOI":"10.1109\/TIFS.2016.2594131","volume":"11","author":"VD Nguyen","year":"2016","unstructured":"Nguyen, V.D., Duong, T.Q., Dobre, O.A., Shin, O.-S.: Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks. IEEE Trans. Inf. Forensics Secur. 11(11), 2609\u20132623 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"6_CR17","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1109\/TCOMM.2015.2498171","volume":"64","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Wang, L., Zaidi, S.A.R., Elkashlan, M., Duong, T.Q.: Secure D2D communica-tion in large-scale cognitive cellular networks: a wireless power transfer model. IEEE Trans. Commun. 64(1), 329\u2013342 (2016)","journal-title":"IEEE Trans. Commun."},{"issue":"11","key":"6_CR18","doi-asserted-by":"publisher","first-page":"11274","DOI":"10.1109\/TVT.2018.2868902","volume":"67","author":"M Li","year":"2018","unstructured":"Li, M., Yin, H., Huang, Y., Wang, Y., Yu, R.: Physical layer security in overlay cognitive radio networks with energy harvesting. IEEE Trans. Veh. Technol. 67(11), 11274\u201311279 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"doi-asserted-by":"crossref","unstructured":"Xu, Q., Ran, P., He, H., Xu, D.: Security-aware routing for artificial-noise-aided multi-hop secondary communications. In: IEEE Wireless Communications and Networking Conference, pp. 1\u20136. IEEE, Barcelona (2018)","key":"6_CR19","DOI":"10.1109\/WCNC.2018.8377033"},{"issue":"2","key":"6_CR20","doi-asserted-by":"publisher","first-page":"217","DOI":"10.3390\/e21020217","volume":"221","author":"PT Tin","year":"2019","unstructured":"Tin, P.T., Hung, D.T., Tan, N.N., Duy, T.T., Voznak, M.: Secrecy performance en-hancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware impairments. Entropy 221(2), 217 (2019)","journal-title":"Entropy"},{"issue":"5","key":"6_CR21","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.3390\/s19051160","volume":"19","author":"PT Tin","year":"2019","unstructured":"Tin, P.T., Nam, P.M., Duy, T.T., Phuong, T.T., Voznak, M.: Secrecy performance en-hancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware impairments. Sensors 19(5), 1160 (2019)","journal-title":"Sensors"},{"issue":"12","key":"6_CR22","doi-asserted-by":"publisher","first-page":"3062","DOI":"10.1109\/TIT.2004.838089","volume":"50","author":"JN Laneman","year":"2004","unstructured":"Laneman, J.N., Tse, D.N., Wornell, G.W.: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans. Inf. Theory 50(12), 3062\u20133080 (2004)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"6_CR23","volume-title":"Table of Integrals, Series, and Products","author":"IS Gradshteyn","year":"2007","unstructured":"Gradshteyn, I.S., Ryzhik, I.M.: Table of Integrals, Series, and Products, 7th edn. Elsevier Inc., San Diego (2007)","edition":"7"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Industrial Networks and Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30149-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T19:03:18Z","timestamp":1567623798000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30149-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030301484","9783030301491"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30149-1_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"17 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INISCOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Industrial Networks and Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iniscom2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iniscom.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}