{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T16:40:01Z","timestamp":1756572001029,"version":"3.40.4"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Research Project of Huangshan University","award":["2024xkjq037"],"award-info":[{"award-number":["2024xkjq037"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s11276-025-03949-9","type":"journal-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T08:09:07Z","timestamp":1744099747000},"page":"3503-3516","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Friendly jammer selection improves physical layer security in energy harvesting communications over Nakagami-m channels"],"prefix":"10.1007","volume":"31","author":[{"given":"Xiao","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Hui","family":"Geng","sequence":"additional","affiliation":[]},{"given":"Peishun","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,7]]},"reference":[{"issue":"2","key":"3949_CR1","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/TCOMM.2021.3140082","volume":"70","author":"X Jiang","year":"2022","unstructured":"Jiang, X., Li, P., Li, B., Zou, Y., & Wang, R. (2022). Intelligent jamming strategies for secure spectrum sharing systems. IEEE Transactions on Communications, 70(2), 1153\u20131167.","journal-title":"IEEE Transactions on Communications"},{"issue":"11","key":"3949_CR2","doi-asserted-by":"publisher","first-page":"5394","DOI":"10.1109\/TWC.2019.2936025","volume":"18","author":"Q Wu","year":"2019","unstructured":"Wu, Q., & Zhang, R. (2019). Intelligent reflecting surface enhanced wireless network via joint active and passive beamforming. IEEE Transactions on Wireless Communications, 18(11), 5394\u20135409.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"3949_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2025.3544300","author":"P Yan","year":"2025","unstructured":"Yan, P., et al. (2025). Securing UAV-aided NOMA wireless powered communications via artificial noise. IEEE Transactions on Wireless Communications. https:\/\/doi.org\/10.1109\/TWC.2025.3544300","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"4","key":"3949_CR4","doi-asserted-by":"publisher","first-page":"2329","DOI":"10.1109\/TWC.2019.2902559","volume":"18","author":"Y Zeng","year":"2019","unstructured":"Zeng, Y., Xu, J., & Zhang, R. (2019). Energy minimization for wireless communication with rotary-Wing UAV. IEEE Transactions on Wireless Communications, 18(4), 2329\u20132345.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"1","key":"3949_CR5","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1109\/JIOT.2019.2946651","volume":"7","author":"Y Zou","year":"2020","unstructured":"Zou, Y., Zhu, J., & Jiang, X. (2020). Joint power splitting and relay selection in energy-harvesting communications for IoT networks. IEEE Internet of Things Journal, 7(1), 584\u2013597.","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"3949_CR6","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1080\/21681724.2019.1692240","volume":"9","author":"S Mondal","year":"2021","unstructured":"Mondal, S., Roy, S. D., & Kundu, S. (2021). Performance analysis of a cognitive radio network with adaptive RF energy harvesting. International Journal of Electronics Letters, 9(1), 114\u2013127.","journal-title":"International Journal of Electronics Letters"},{"issue":"1","key":"3949_CR7","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1109\/TCOMM.2022.3222872","volume":"71","author":"J Hu","year":"2023","unstructured":"Hu, J., Xu, G., Hu, L., Li, S., & Xing, Y. (2023). An adaptive energy efficient MAC protocol for RF energy harvesting WBANs. IEEE Transactions on Communications, 71(1), 473\u2013484.","journal-title":"IEEE Transactions on Communications"},{"issue":"7","key":"3949_CR8","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/LCOMM.2021.3073093","volume":"25","author":"D Gunasinghe","year":"2021","unstructured":"Gunasinghe, D., & Baduge, G. A. A. (2021). Performance analysis of SWIPT for intelligent reflective surfaces for wireless communication. IEEE Communications Letters, 25(7), 2201\u20132205.","journal-title":"IEEE Communications Letters"},{"issue":"2","key":"3949_CR9","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/TGCN.2017.2684827","volume":"1","author":"H Lei","year":"2017","unstructured":"Lei, H., Xu, M., Ansari, I. S., Pan, G., Qaraqe, K. A., & Alouini, M.-S. (2017). On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection. IEEE Transactions on Green Communications and Networking, 1(2), 192\u2013203.","journal-title":"IEEE Transactions on Green Communications and Networking"},{"issue":"5","key":"3949_CR10","doi-asserted-by":"publisher","first-page":"5272","DOI":"10.1109\/TWC.2023.3325384","volume":"23","author":"S Feng","year":"2024","unstructured":"Feng, S., Lu, X., Niyato, D., Hossain, E., & Sun, S. (2024). Achieving covert communication in large-scale SWIPT-enabled D2D networks. IEEE Transactions on Wireless Communications, 23(5), 5272\u20135286.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"1","key":"3949_CR11","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1109\/TVT.2021.3049185","volume":"70","author":"I Budhiraja","year":"2021","unstructured":"Budhiraja, I., Kumar, N., Tyagi, S., Tanwar, S., & Guizani, M. (2021). SWIPT-enabled D2D communication underlaying NOMA-based cellular networks in imperfect CSI. IEEE Transactions on Vehicular Technology, 70(1), 692\u2013699.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"9","key":"3949_CR12","doi-asserted-by":"publisher","first-page":"6282","DOI":"10.1109\/TCOMM.2019.2916070","volume":"67","author":"H Lei","year":"2019","unstructured":"Lei, H., Yang, Z., Park, K.-H., Ansari, I. S., Guo, Y., Pan, G., & Alouini, M.-S. (2019). Secrecy outage analysis for cooperative NOMA systems with relay selection schemes. IEEE Transactions on Communications, 67(9), 6282\u20136298.","journal-title":"IEEE Transactions on Communications"},{"issue":"9","key":"3949_CR13","doi-asserted-by":"publisher","first-page":"6164","DOI":"10.1109\/TCOMM.2022.3194981","volume":"70","author":"X Jiang","year":"2022","unstructured":"Jiang, X., Li, P., Zou, Y., Li, B., & Wang, R. (2022). Physical layer security for cognitive multiuser networks with hardware impairments and channel estimation errors. IEEE Transactions on Communications, 70(9), 6164\u20136180.","journal-title":"IEEE Transactions on Communications"},{"issue":"9","key":"3949_CR14","doi-asserted-by":"publisher","first-page":"1882","DOI":"10.1109\/LCOMM.2018.2853101","volume":"22","author":"L Qing","year":"2018","unstructured":"Qing, L., Guangyao, H., & Xiaomei, F. (2018). Physical layer security in multi-hop AF relay network based on compressed sensing. IEEE Communications Letters, 22(9), 1882\u20131885.","journal-title":"IEEE Communications Letters"},{"issue":"4","key":"3949_CR15","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/TCCN.2017.2758372","volume":"3","author":"H Lei","year":"2017","unstructured":"Lei, H., Zhang, H., Ansari, I. S., Ren, Z., Pan, G., Qaraqe, K. A., & Alouini, M.-S. (2017). On secrecy outage of relay selection in underlay cognitive radio networks over Nakagami-$$m$$ fading channel. IEEE Transactions on Cognitive Communications and Networking, 3(4), 614\u2013627.","journal-title":"IEEE Transactions on Cognitive Communications and Networking"},{"issue":"6","key":"3949_CR16","doi-asserted-by":"publisher","first-page":"3856","DOI":"10.1109\/TWC.2016.2530068","volume":"15","author":"L Fan","year":"2016","unstructured":"Fan, L., Yang, N., Duong, T. Q., Elkashlan, M., & Karagiannidis, G. K. (2016). Exploiting direct links for physical layer security in multiuser multirelay networks. IEEE Transactions on Wireless Communications, 15(6), 3856\u20133867.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"3949_CR17","doi-asserted-by":"publisher","first-page":"5599334","DOI":"10.1155\/2021\/5599334","volume":"2021","author":"X Jiang","year":"2021","unstructured":"Jiang, X., Li, P., Li, B., Zou, Y., & Wang, R. (2021). Security-reliability tradeoff for friendly jammer aided multiuser scheduling in energy harvesting communications. Security and Communication Networks, 2021, 5599334.","journal-title":"Security and Communication Networks"},{"issue":"8","key":"3949_CR18","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner, A. D. (1975). The wiretap channel. Bell System Technical Journal, 54(8), 1355\u20131387.","journal-title":"Bell System Technical Journal"},{"issue":"4","key":"3949_CR19","doi-asserted-by":"publisher","first-page":"2606","DOI":"10.1109\/TCOMM.2022.3147241","volume":"70","author":"Y Zhang","year":"2022","unstructured":"Zhang, Y., Xia, W., Zheng, G., Zhao, H., Yang, L., & Zhu, H. (2022). Secure transmission in cell-free massive MIMO with low-resolution DACs over Rician fading channels. IEEE Transactions on Communications, 70(4), 2606\u20132621.","journal-title":"IEEE Transactions on Communications"},{"issue":"1","key":"3949_CR20","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1109\/TVT.2022.3203804","volume":"72","author":"T Zhang","year":"2023","unstructured":"Zhang, T., Chen, G., & Wang, R. (2023). Secure degrees of freedom of the three-user MIMO broadcast channel with delayed CSIT. IEEE Transactions on Vehicular Technology, 72(1), 704\u2013717.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"1","key":"3949_CR21","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/TWC.2016.2617328","volume":"16","author":"L Yang","year":"2017","unstructured":"Yang, L., Chen, J., Jiang, H., Vorobyov, S. A., & Zhang, H. (2017). Optimal relay selection for secure cooperative communications with an adaptive eavesdropper. IEEE Transactions on Wireless Communications, 16(1), 26\u201342.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"3949_CR22","doi-asserted-by":"publisher","first-page":"2824","DOI":"10.1109\/JSYST.2022.3201128","volume":"17","author":"TN Nguyen","year":"2023","unstructured":"Nguyen, T. N., Tran, D.-H., Van Chien, T., Phan, V.-D., Voznak, M., & Chatzinotas, S. (2023). Security and reliability analysis of satellite-terrestrial multirelay networks with imperfect CSI. IEEE Systems Journal, 17(2), 2824\u20132835.","journal-title":"IEEE Systems Journal"},{"key":"3949_CR23","doi-asserted-by":"publisher","first-page":"127078","DOI":"10.1109\/ACCESS.2019.2939048","volume":"7","author":"I Bang","year":"2019","unstructured":"Bang, I., & Jung, B. C. (2019). Secrecy rate analysis of opportunistic user scheduling in uplink networks with potential eavesdroppers. IEEE Access, 7, 127078\u2013127089.","journal-title":"IEEE Access"},{"key":"3949_CR24","doi-asserted-by":"publisher","first-page":"1295","DOI":"10.1109\/LSP.2020.3009189","volume":"27","author":"T Bao","year":"2020","unstructured":"Bao, T., Yang, H.-C., & Hasna, M. O. (2020). Secrecy outage analysis over random beamforming transmission with user scheduling: Collusion vs. exclusion. IEEE Signal Processing Letters, 27, 1295\u20131299.","journal-title":"IEEE Signal Processing Letters"},{"issue":"7","key":"3949_CR25","doi-asserted-by":"publisher","first-page":"7473","DOI":"10.1109\/TVT.2020.2992766","volume":"69","author":"P Yan","year":"2020","unstructured":"Yan, P., Yang, J., Liu, M., Sun, J., & Gui, G. (2020). Secrecy outage analysis of transmit antenna selection assisted with wireless power beacon. IEEE Transactions on Vehicular Technology, 69(7), 7473\u20137482.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"22","key":"3949_CR26","doi-asserted-by":"publisher","first-page":"22631","DOI":"10.1109\/JIOT.2022.3181826","volume":"9","author":"X Zheng","year":"2022","unstructured":"Zheng, X., Zhang, J., & Pan, G. (2022). On secrecy analysis of underlay cognitive UAV-aided NOMA systems with TAS\/MRC. IEEE Internet of Things Journal, 9(22), 22631\u201322642.","journal-title":"IEEE Internet of Things Journal"},{"issue":"5","key":"3949_CR27","doi-asserted-by":"publisher","first-page":"3482","DOI":"10.1109\/TCOMM.2019.2894824","volume":"67","author":"B Li","year":"2019","unstructured":"Li, B., Zou, Y., Zhou, J., Wang, F., Cao, W., & Yao, Y. (2019). Secrecy outage probability analysis of friendly jammer selection aided multiuser scheduling for wireless networks. IEEE Transactions on Communications, 67(5), 3482\u20133495.","journal-title":"IEEE Transactions on Communications"},{"issue":"6","key":"3949_CR28","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1049\/iet-com.2019.1042","volume":"12","author":"H Zhou","year":"2020","unstructured":"Zhou, H., He, D., & Wang, H. (2020). Joint relay and jammer selection for secure cooperative networks with a full-duplex active eavesdropper. IET Communications, 12(6), 1043.","journal-title":"IET Communications"},{"issue":"12","key":"3949_CR29","doi-asserted-by":"publisher","first-page":"16308","DOI":"10.1109\/TVT.2023.3299083","volume":"72","author":"X Jiang","year":"2023","unstructured":"Jiang, X., Li, P., Zou, Y., Li, B., & Wang, R. (2023). Secure transmission for wireless communication systems with friendly jammers. IEEE Transactions on Vehicular Technology, 72(12), 16308\u201316322.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3949_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3522666","author":"G Liu","year":"2024","unstructured":"Liu, G., et al. (2024). PSRAKA Physically secure and robust authenticated key agreement for VANETs. IEEE Transactions on Vehicular Technology. https:\/\/doi.org\/10.1109\/TVT.2024.3522666","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3949_CR31","doi-asserted-by":"publisher","first-page":"102583","DOI":"10.1016\/j.phycom.2024.102583","volume":"68","author":"N Goshayesh","year":"2025","unstructured":"Goshayesh, N., Rajabi, R., Kuhestani, A., Keshavarzi, M., & Ahmadi, H. (2025). Intelligent secure transmission in untrusted relaying systems with hardware impairments. Physical Communications, 68, 102583.","journal-title":"Physical Communications"},{"issue":"13","key":"3949_CR32","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.1049\/iet-com.2018.6087","volume":"13","author":"P Nguyen-Huu","year":"2019","unstructured":"Nguyen-Huu, P., Ho-Van, K., & Bao, V. N. Q. (2019). Secrecy outage analysis of energy harvesting two-way relaying networks with friendly jammer. IET Communications, 13(13), 1877\u20131885.","journal-title":"IET Communications"},{"issue":"2","key":"3949_CR33","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1109\/TCOMM.2016.2623627","volume":"65","author":"J Moon","year":"2017","unstructured":"Moon, J., Lee, H., Song, C., & Lee, I. (2017). Secrecy performance optimization for wireless powered communication networks with an energy harvesting jammer. IEEE Transactions on Communications, 65(2), 764\u2013774.","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"3949_CR34","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TVT.2017.2725989","volume":"67","author":"P Yan","year":"2018","unstructured":"Yan, P., Zou, Y., & Zhu, J. (2018). Energy-aware multiuser scheduling for physical-layer security in energy-harvesting underlay cognitive radio systems. IEEE Transactions on Vehicular Technology, 67(3), 2084\u20132096.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"1","key":"3949_CR35","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1109\/JSEN.2022.3224128","volume":"23","author":"TN Nguyen","year":"2023","unstructured":"Nguyen, T. N., et al. (2023). Physical layer security in AF-based cooperative SWIPT sensor networks. IEEE Sensors Journal, 23(1), 689\u2013705.","journal-title":"IEEE Sensors Journal"},{"issue":"2","key":"3949_CR36","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1109\/TGCN.2023.3336423","volume":"8","author":"P Yan","year":"2024","unstructured":"Yan, P., Ji, X., Zou, Y., & Li, B. (2024). Physical-layer security for energy-harvesting multiuser systems under hardware impairments and channel estimation errors. IEEE Transactions on Green Communications and Networking, 8(2), 656\u2013671.","journal-title":"IEEE Transactions on Green Communications and Networking"},{"issue":"9","key":"3949_CR37","doi-asserted-by":"publisher","first-page":"8451","DOI":"10.1109\/TVT.2018.2848648","volume":"67","author":"MT Mamaghani","year":"2018","unstructured":"Mamaghani, M. T., Kuhestani, A., & Wong, K. (2018). Secure two-way transmission via wireless-powered untrusted relay and external jammer. IEEE Transactions on Vehicular Technology, 67(9), 8451\u20138465.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3949_CR38","doi-asserted-by":"publisher","first-page":"2196","DOI":"10.1109\/OJCOMS.2024.3381951","volume":"5","author":"V Shahiri","year":"2024","unstructured":"Shahiri, V., Forouzesh, M., Behroozi, H., Kuhestani, A., & Wong, K.-K. (2024). Deep learning aided secure transmission in wirelessly powered untrusted relaying in the face of hardware impairments. IEEE Open Journal of the Communications Society, 5, 2196\u20132210.","journal-title":"IEEE Open Journal of the Communications Society"},{"key":"3949_CR39","volume-title":"Tables of integrals, series, and products","author":"IS Gradshteyn","year":"2007","unstructured":"Gradshteyn, I. S., & Ryzhik, I. M. (2007). Tables of integrals, series, and products (7th ed.). New York: Academic Press.","edition":"7"},{"issue":"2","key":"3949_CR40","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1109\/TWC.2016.2645200","volume":"16","author":"Y Zou","year":"2017","unstructured":"Zou, Y. (2017). Physical-layer security for spectrum sharing systems. IEEE Transactions on Wireless Communications, 16(2), 1319\u20131329.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"3949_CR41","doi-asserted-by":"publisher","first-page":"25196","DOI":"10.1109\/ACCESS.2017.2768443","volume":"5","author":"VN Vo","year":"2017","unstructured":"Vo, V. N., Nguyen, T. G., So-In, C., & Ha, D. (2017). Secrecy performance analysis of energy harvesting wireless sensor networks with a friendly jammer. IEEE Access, 5, 25196\u201325206.","journal-title":"IEEE Access"},{"key":"3949_CR42","volume-title":"NIST handbook of mathematical functions","author":"FW Olver","year":"2010","unstructured":"Olver, F. W., Lozier, D. W., Boisvert, R. F., & Charles, W. C. (2010). NIST handbook of mathematical functions. Cambridge: Cambridge University Press."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03949-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-025-03949-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03949-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T02:20:55Z","timestamp":1745288455000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-025-03949-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["3949"],"URL":"https:\/\/doi.org\/10.1007\/s11276-025-03949-9","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2025,4]]},"assertion":[{"value":"17 March 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}