{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:41:48Z","timestamp":1740123708930,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,11,7]],"date-time":"2018-11-07T00:00:00Z","timestamp":1541548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11036-018-1159-z","type":"journal-article","created":{"date-parts":[[2018,11,7]],"date-time":"2018-11-07T06:31:13Z","timestamp":1541572273000},"page":"480-490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Performance Analysis for Secure Cooperative Systems Under Unreliable Backhaul Over Nakagami-m Channels"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9662-3987","authenticated-orcid":false,"given":"Cheng","family":"Yin","sequence":"first","affiliation":[]},{"given":"Emiliano","family":"Garcia-Palacios","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,7]]},"reference":[{"key":"1159_CR1","doi-asserted-by":"crossref","unstructured":"Akitaya T, Asano S, Saba T (2014) Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in mimo-ofdm systems. In: 2014 IEEE international conference on Communications workshops (ICC). IEEE, pp 807\u2013812","DOI":"10.1109\/ICCW.2014.6881299"},{"key":"1159_CR2","unstructured":"Ali MS, Synthia M (2015) Performance analysis of jt-comp transmission in heterogeneous network over unreliable backhaul. In: 2015 international conference on Electrical engineering and information communication technology (ICEEICT). IEEE, pp. 1\u20135"},{"issue":"3","key":"1159_CR3","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2010","unstructured":"Dong L, Han Z, Petropulu AP, Poor HV (2010) Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Process 58(3):1875\u20131888","journal-title":"IEEE Trans Signal Process"},{"issue":"2","key":"1159_CR4","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1109\/LWC.2017.2769052","volume":"7","author":"A El Shafie","year":"2018","unstructured":"El Shafie A, Mabrouk A, Tourki K, Al-Dhahir N, Hamila R (2018) A secret-key-aided scheme to secure transmissions from single-antenna rf-eh source nodes. IEEE Wirel Commun Lett 7(2):238\u2013241","journal-title":"IEEE Wirel Commun Lett"},{"issue":"12","key":"1159_CR5","doi-asserted-by":"publisher","first-page":"5173","DOI":"10.1109\/JSEN.2018.2829145","volume":"18","author":"TD Hieu","year":"2018","unstructured":"Hieu TD, Duy TT, Kim BS (2018) Performance enhancement for multihop harvest-to-transmit wsns with path-selection methods in presence of eavesdroppers and hardware noises. IEEE Sensors J 18(12):5173\u20135186","journal-title":"IEEE Sensors J"},{"issue":"2","key":"1159_CR6","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/LWC.2017.2650224","volume":"6","author":"TM Hoang","year":"2017","unstructured":"Hoang TM, Duong TQ, Vo NS, Kundu C (2017) Physical layer security in cooperative energy harvesting networks with a friendly jammer. IEEE Wirel Commun Lett 6(2):174\u2013177","journal-title":"IEEE Wirel Commun Lett"},{"issue":"8","key":"1159_CR7","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/LSP.2014.2387860","volume":"22","author":"H Hui","year":"2015","unstructured":"Hui H, Swindlehurst AL, Li G, Liang J (2015) Secure relay and jammer selection for physical layer security. IEEE Signal Process Lett 22(8):1147\u20131151","journal-title":"IEEE Signal Process Lett"},{"key":"1159_CR8","volume-title":"Table of integrals, series, and products","author":"A Jeffrey","year":"2007","unstructured":"Jeffrey A, Zwillinger D (2007) Table of integrals, series, and products. Academic Press, New York"},{"issue":"9","key":"1159_CR9","doi-asserted-by":"publisher","first-page":"3858","DOI":"10.1109\/TCOMM.2016.2592529","volume":"64","author":"X Jiang","year":"2016","unstructured":"Jiang X, Zhong C, Chen X, Duong TQ, Tsiftsis TA, Zhang Z (2016) Secrecy performance of wirelessly powered wiretap channels. IEEE Trans Commun 64(9):3858\u20133871","journal-title":"IEEE Trans Commun"},{"issue":"8","key":"1159_CR10","doi-asserted-by":"publisher","first-page":"1386","DOI":"10.1109\/LCOMM.2015.2442991","volume":"19","author":"TA Khan","year":"2015","unstructured":"Khan TA, Orlik P, Kim KJ, Heath RW (2015) Performance analysis of cooperative wireless networks with unreliable backhaul links. IEEE Commun Lett 19(8):1386\u20131389","journal-title":"IEEE Commun Lett"},{"issue":"3","key":"1159_CR11","doi-asserted-by":"publisher","first-page":"2448","DOI":"10.1109\/TVT.2016.2585347","volume":"66","author":"KJ Kim","year":"2017","unstructured":"Kim KJ, Khan TA, Orlik PV (2017) Performance analysis of cooperative systems with unreliable backhauls and selection combining. IEEE Trans Veh Technol 66(3):2448\u20132461","journal-title":"IEEE Trans Veh Technol"},{"issue":"7","key":"1159_CR12","doi-asserted-by":"publisher","first-page":"5001","DOI":"10.1109\/TWC.2016.2545649","volume":"15","author":"KJ Kim","year":"2016","unstructured":"Kim KJ, Orlik PV, Khan TA (2016) Performance analysis of finite-sized co-operative systems with unreliable backhauls. IEEE Trans Wirel Commun 15(7):5001\u20135015","journal-title":"IEEE Trans Wirel Commun"},{"issue":"17","key":"1159_CR13","doi-asserted-by":"publisher","first-page":"4403","DOI":"10.1109\/TSP.2016.2552508","volume":"64","author":"KJ Kim","year":"2016","unstructured":"Kim KJ, Yeoh PL, Orlik PV, Poor HV (2016) Secrecy performance of finite-sized cooperative single carrier systems with unreliable backhaul connections. IEEE Trans Signal Process 64(17): 4403\u20134416","journal-title":"IEEE Trans Signal Process"},{"issue":"23","key":"1159_CR14","doi-asserted-by":"publisher","first-page":"6185","DOI":"10.1109\/TSP.2017.2745463","volume":"65","author":"H Liu","year":"2017","unstructured":"Liu H, Kim KJ, Tsiftsis TA, Kwak KS, Poor HV (2017) Secrecy performance of finite-sized cooperative full-duplex relay systems with unreliable backhauls. IEEE Trans Signal Process 65(23):6185\u20136200","journal-title":"IEEE Trans Signal Process"},{"key":"1159_CR15","doi-asserted-by":"crossref","unstructured":"Liu H, Kwak KS (2017) Outage probability of finite-sized selective relaying systems with unreliable backhauls. In: 2017 international conference on Information and communication technology convergence (ICTC). IEEE, pp 1232\u20131237","DOI":"10.1109\/ICTC.2017.8190907"},{"issue":"1","key":"1159_CR16","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TWC.2015.2474378","volume":"15","author":"W Liu","year":"2016","unstructured":"Liu W, Zhou X, Durrani S, Popovski P (2016) Secure communication with a wireless-powered friendly jammer. IEEE Trans Wirel Commun 15(1):401\u2013415","journal-title":"IEEE Trans Wirel Commun"},{"issue":"1","key":"1159_CR17","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/LWC.2014.2365808","volume":"4","author":"Y Liu","year":"2015","unstructured":"Liu Y, Wang L, Duy TT, Elkashlan M, Duong TQ (2015) Relay selection for security enhancement in cognitive relay networks. IEEE Wirel Commun Lett 4(1):46\u201349","journal-title":"IEEE Wirel Commun Lett"},{"key":"1159_CR18","unstructured":"Mathai AM, Saxena RK (1978) The h function with applications in statistics and other disciplines"},{"key":"1159_CR19","doi-asserted-by":"crossref","unstructured":"Nguyen HT, Duong TQ, Dobre OA, Hwang WJ (2017) Cognitive heterogeneous networks with best relay selection over unreliable backhaul connections. In: 2017 IEEE 86th Vehicular technology conference (VTC-fall). IEEE, pp 1\u20135","DOI":"10.1109\/VTCFall.2017.8287966"},{"issue":"10","key":"1159_CR20","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1109\/LCOMM.2017.2718500","volume":"21","author":"HT Nguyen","year":"2017","unstructured":"Nguyen HT, Duong TQ, Hwang WJ (2017) Multiuser relay networks over unreliable backhaul links under spectrum sharing environment. IEEE Commun Lett 21(10):2314\u20132317","journal-title":"IEEE Commun Lett"},{"key":"1159_CR21","unstructured":"Nguyen HT, Ha DB, Nguyen SQ, Hwang WJ (2017) Cognitive heterogeneous networks with unreliable backhaul connections. Mobile Networks and Applications:1\u201314"},{"key":"1159_CR22","doi-asserted-by":"publisher","first-page":"18310","DOI":"10.1109\/ACCESS.2017.2727399","volume":"5","author":"HT Nguyen","year":"2017","unstructured":"Nguyen HT, Zhang J, Yang N, Duong TQ, Hwang WJ (2017) Secure cooperative single carrier systems under unreliable backhaul and dense networks impact. IEEE Access 5:18310\u201318324","journal-title":"IEEE Access"},{"issue":"4","key":"1159_CR23","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1109\/TCCN.2017.2748132","volume":"3","author":"VD Nguyen","year":"2017","unstructured":"Nguyen VD, Duong TQ, Shin OS, Nallanathan A, Karagiannidis GK (2017) Enhancing phy security of cooperative cognitive radio multicast communications. IEEE Trans Cogn Commun Netw 3(4):599\u2013613","journal-title":"IEEE Trans Cogn Commun Netw"},{"key":"1159_CR24","volume-title":"Integrals and Series, vol. 1: Elementary functions","author":"A Prudnikov","year":"1998","unstructured":"Prudnikov A, Brychkov I, Marichev O (1998) Integrals and Series, vol. 1: Elementary functions. Gordon and Breach Science Publishers, New York"},{"issue":"12","key":"1159_CR25","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCOM.2015.7355563","volume":"53","author":"LJ Rodr\u00edguez","year":"2015","unstructured":"Rodr\u00edguez LJ, Tran NH, Duong TQ, Le-Ngoc T, Elkashlan M, Shetty S (2015) Physical layer security in wireless cooperative relay networks: State of the art and beyond. IEEE Commun Mag 53(12):32\u201339","journal-title":"IEEE Commun Mag"},{"key":"1159_CR26","doi-asserted-by":"crossref","unstructured":"Sheng Z, Tuan HD, Nasir AA, Duong TQ, Poor HV (2018) Power allocation for energy efficiency and secrecy of wireless interference networks. IEEE Transactions on Wireless Communications","DOI":"10.1109\/TWC.2018.2815626"},{"issue":"5","key":"1159_CR27","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MWC.2015.7306534","volume":"22","author":"U Siddique","year":"2015","unstructured":"Siddique U, Tabassum H, Hossain E, Kim DI (2015) Wireless backhauling of 5g small cells: challenges and solution approaches. IEEE Wirel Commun 22(5):22\u201331","journal-title":"IEEE Wirel Commun"},{"issue":"1","key":"1159_CR28","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/TIFS.2014.2360437","volume":"10","author":"L Wang","year":"2015","unstructured":"Wang L, Kim KJ, Duong TQ, Elkashlan M, Poor HV (2015) Security enhancement of cooperative single carrier systems. IEEE Trans Inf Forensic Secur 10(1):90\u2013103","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"8","key":"1159_CR29","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner AD (1975) The wire-tap channel. Bell Labs Techn J 54(8):1355\u20131387","journal-title":"Bell Labs Techn J"},{"issue":"12","key":"1159_CR30","doi-asserted-by":"publisher","first-page":"5189","DOI":"10.1109\/TCOMM.2016.2606396","volume":"64","author":"M Yang","year":"2016","unstructured":"Yang M, Guo D, Huang Y, Duong TQ, Zhang B (2016) Physical layer security with threshold-based multiuser scheduling in multi-antenna wireless networks. IEEE Trans Commun 64(12):5189\u20135202","journal-title":"IEEE Trans Commun"},{"key":"1159_CR31","doi-asserted-by":"publisher","first-page":"12074","DOI":"10.1109\/ACCESS.2018.2794507","volume":"6","author":"C Yin","year":"2018","unstructured":"Yin C, Nguyen HT, Kundu C, Kaleem Z, Garcia-Palacios E, Duong TQ (2018) Secure energy harvesting relay networks with unreliable backhaul connections. IEEE Access 6:12074\u2013 12084","journal-title":"IEEE Access"},{"issue":"8","key":"1159_CR32","doi-asserted-by":"publisher","first-page":"3831","DOI":"10.1109\/TVT.2010.2059057","volume":"59","author":"X Zhou","year":"2010","unstructured":"Zhou X, McKay MR (2010) Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation. IEEE Trans Veh Technol 59(8):3831\u20133842","journal-title":"IEEE Trans Veh Technol"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1159-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1159-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1159-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T19:15:32Z","timestamp":1573067732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1159-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,7]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["1159"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1159-z","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2018,11,7]]},"assertion":[{"value":"7 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}