{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:49:38Z","timestamp":1774367378554,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T00:00:00Z","timestamp":1500940800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s11277-017-4518-3","type":"journal-article","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T08:41:10Z","timestamp":1500972070000},"page":"539-563","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Secrecy Outage of Dual-Hop Amplify-and-Forward Relay System with Diversity Combining at the Eavesdropper"],"prefix":"10.1007","volume":"97","author":[{"given":"Chinmoy","family":"Kundu","sequence":"first","affiliation":[]},{"given":"Abhishek","family":"Jindal","sequence":"additional","affiliation":[]},{"given":"Ranjan","family":"Bose","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,25]]},"reference":[{"issue":"8","key":"4518_CR1","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54(8), 1355\u20131387. doi: 10.1002\/j.1538-7305.1975.tb02040.x .","journal-title":"Bell System Technical Journal"},{"issue":"10","key":"4518_CR2","doi-asserted-by":"crossref","first-page":"4687","DOI":"10.1109\/TIT.2008.928990","volume":"54","author":"PK Gopala","year":"2008","unstructured":"Gopala, P. K., Lai, L., & Gamal, H. E. (2008). On the secrecy capacity of fading channels. IEEE Transactions of Information Theory, 54(10), 4687\u20134698.","journal-title":"IEEE Transactions of Information Theory"},{"issue":"4\u20135","key":"4518_CR3","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1561\/0100000036","volume":"5","author":"Y Liang","year":"2009","unstructured":"Liang, Y., Poor, H., et al. (2009). Information theoretic security. Foundations and Trends in Communications and Information Theory, 5(4\u20135), 355\u2013580.","journal-title":"Foundations and Trends in Communications and Information Theory"},{"issue":"6","key":"4518_CR4","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M Bloch","year":"2008","unstructured":"Bloch, M., Barros, J., Rodrigues, M. R. D., & McLaughlin, S. (2008). Wireless information-theoretic security. IEEE Transactions of Information Theory, 54(6), 2515\u20132534.","journal-title":"IEEE Transactions of Information Theory"},{"key":"4518_CR5","doi-asserted-by":"crossref","unstructured":"Barros, J., Rodrigues, M. R. D. (2006). Secrecy Capacity of Wireless Channels. InProceedings of the IEEE international symposium on information theory (ISIT) (pp. 356\u2013360).","DOI":"10.1109\/ISIT.2006.261613"},{"issue":"3","key":"4518_CR6","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csiszar","year":"1978","unstructured":"Csiszar, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions of Information Theory, 24(3), 339\u2013348.","journal-title":"IEEE Transactions of Information Theory"},{"issue":"7","key":"4518_CR7","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TIFS.2013.2261060","volume":"8","author":"S Luo","year":"2013","unstructured":"Luo, S., Li, J., & Petropulu, A. P. (2013). Uncoordinated cooperative jamming for secret communications. IEEE Transactions on Information Forensics and Security, 8(7), 1081\u20131090.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"4518_CR8","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/TIFS.2011.2181946","volume":"7","author":"S Gerbracht","year":"2012","unstructured":"Gerbracht, S., Scheunert, C., & Jorswieck, E. (2012). Secrecy outage in MISO systems with partial channel information. IEEE Transactions on Information Forensics and Security, 7(2), 704\u2013716.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"9","key":"4518_CR9","doi-asserted-by":"crossref","first-page":"4005","DOI":"10.1109\/TIT.2008.928272","volume":"54","author":"L Lai","year":"2008","unstructured":"Lai, L., & Gamal, H. E. (2008). The Relay\u2013Eavesdropper channel: Cooperation for secrecy. IEEE Transactions of Information Theory, 54(9), 4005\u20134019.","journal-title":"IEEE Transactions of Information Theory"},{"issue":"3","key":"4518_CR10","doi-asserted-by":"crossref","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2010","unstructured":"Dong, L., Han, Z., Petropulu, A., & Poor, H. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactionns of Signal Processing, 58(3), 1875\u20131888.","journal-title":"IEEE Transactionns of Signal Processing"},{"issue":"10","key":"4518_CR11","doi-asserted-by":"crossref","first-page":"4985","DOI":"10.1109\/TSP.2011.2159598","volume":"59","author":"J Li","year":"2011","unstructured":"Li, J., Petropulu, A., & Weber, S. (2011). On cooperative relaying schemes for wireless physical layer security. IEEE Transactionns of Signal Processing, 59(10), 4985\u20134997.","journal-title":"IEEE Transactionns of Signal Processing"},{"issue":"15","key":"4518_CR12","doi-asserted-by":"crossref","first-page":"1787","DOI":"10.1049\/iet-com.2009.0634","volume":"4","author":"I Krikidis","year":"2010","unstructured":"Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4(15), 1787\u20131791.","journal-title":"IET Communications"},{"issue":"10","key":"4518_CR13","doi-asserted-by":"crossref","first-page":"5003","DOI":"10.1109\/TWC.2009.090323","volume":"8","author":"I Krikidis","year":"2009","unstructured":"Krikidis, I., Thompson, J., & McLaughlin, S. (2009). Relay selection for secure cooperative networks with jamming. IEEE Transactions of Wireless Communications, 8(10), 5003\u20135011.","journal-title":"IEEE Transactions of Wireless Communications"},{"issue":"10","key":"4518_CR14","doi-asserted-by":"crossref","first-page":"2099","DOI":"10.1109\/JSAC.2013.131011","volume":"31","author":"Y Zou","year":"2013","unstructured":"Zou, Y., Wang, X., & Shen, W. (2013). Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE Journal on Selected Areas in Communications, 31(10), 2099\u20132111.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1\u20132","key":"4518_CR15","first-page":"33","volume":"2","author":"VNQ Bao","year":"2012","unstructured":"Bao, V. N. Q., & Trung, N. L. (2012). Multihop decode-and-forward relay networks: Secrecy analysis and relay position optimization. REV Journal on Electronics and Communications, 2(1\u20132), 33\u201341.","journal-title":"REV Journal on Electronics and Communications"},{"key":"4518_CR16","doi-asserted-by":"crossref","unstructured":"Jindal, A., Kundu, C., & Bose, R. (2014). Secrecy outage of dual-hop amplify-and-forward system and its application to relay selection. InProceedings of the IEEE 79th vehicular technology conference (VTC Spring).","DOI":"10.1109\/VTCSpring.2014.7023086"},{"issue":"10","key":"4518_CR17","doi-asserted-by":"crossref","first-page":"1759","DOI":"10.1109\/LCOMM.2014.2339323","volume":"18","author":"A Jindal","year":"2014","unstructured":"Jindal, A., Kundu, C., & Bose, R. (2014). Secrecy outage of dual-hop af relay system with relay selection without eavesdropper\u2019s CSI. IEEE Communications Letters, 18(10), 1759\u20131762.","journal-title":"IEEE Communications Letters"},{"key":"4518_CR18","doi-asserted-by":"crossref","unstructured":"Hwang, K.-S., & Ju, M. (2014). Secrecy outage probability of amplify-and-forward transmission with multi-antenna relay in presence of eavesdropper. In Proceedings of the IEEE international conference on communications (ICC) (pp. 5408\u20135412).","DOI":"10.1109\/ICC.2014.6884181"},{"key":"4518_CR19","doi-asserted-by":"crossref","unstructured":"Gabry, F., Salimi, S., Thobaben, R., & Skoglund, M. (2013). High SNR performance of amplify-and-forward relaying in Rayleigh fading wiretap channels. InProceedings of the Iran workshop on communication and information theory (IWCIT) (pp. 1\u20135).","DOI":"10.1109\/IWCIT.2013.6555771"},{"issue":"10","key":"4518_CR20","doi-asserted-by":"crossref","first-page":"5438","DOI":"10.1109\/TSP.2010.2053708","volume":"58","author":"Y Zou","year":"2010","unstructured":"Zou, Y., Zhu, J., Zheng, B., & Yao, Y.-D. (2010). An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks. IEEE Transactions of Signal Processing, 58(10), 5438\u20135445.","journal-title":"IEEE Transactions of Signal Processing"},{"key":"4518_CR21","volume-title":"Digital communications","author":"J Proakis","year":"2001","unstructured":"Proakis, J. (2001). Digital communications. New York: McGraw-Hill."},{"issue":"5","key":"4518_CR22","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1109\/LCOMM.2003.812178","volume":"7","author":"MO Hasna","year":"2003","unstructured":"Hasna, M. O., & Alouini, M.-S. (2003). Outage probability of multihop transmission over Nakagami fading channels. IEEE Communications Letters, 7(5), 216\u2013218.","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"4518_CR23","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/TCOMM.2003.822185","volume":"52","author":"MO Hasna","year":"2004","unstructured":"Hasna, M. O., & Alouini, M.-S. (2004). Harmonic mean and end-to-end performance of transmission systems with relays. EEE Transactions on Communications, 52(1), 130\u2013135.","journal-title":"EEE Transactions on Communications"},{"key":"4518_CR24","doi-asserted-by":"crossref","unstructured":"Karagiannidis, G., Tsiftsis, T., Mallik, R., Sagias, N., & Kotsopoulos, S. (2005). Closed-form bounds for multihop relayed communications in Nakagami-m fading. In Proceedings of the IEEE international conference on communications (ICC) (Vol. 4, pp. 2362\u20132366).","DOI":"10.1109\/ICC.2005.1494758"},{"issue":"1","key":"4518_CR25","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/TCOMM.2005.861679","volume":"54","author":"G Karagiannidis","year":"2006","unstructured":"Karagiannidis, G., Tsiftsis, T., & Mallik, R. (2006). Bounds for multihop relayed communications in Nakagami-m fading. IEEE Transactions on Communications, 54(1), 18\u201322.","journal-title":"IEEE Transactions on Communications"},{"key":"4518_CR26","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/WCNC.2000.904590","volume":"1","author":"J Laneman","year":"2000","unstructured":"Laneman, J., & Wornell, G. (2000). Energy-efficient antenna sharing and relaying for wireless networks. Proceedings of the IEEE Wireless Communications and Networking Confernce (WCNC)., 1, 7\u201312.","journal-title":"Proceedings of the IEEE Wireless Communications and Networking Confernce (WCNC)."},{"issue":"5","key":"4518_CR27","doi-asserted-by":"crossref","first-page":"2286","DOI":"10.1109\/TWC.2009.080818","volume":"8","author":"G Farhadi","year":"2009","unstructured":"Farhadi, G., & Beaulieu, N. (2009). On the ergodic capacity of multi-hop wireless relaying systems. IEEE Transactions on Wireless Communications, 8(5), 2286\u20132291.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"4518_CR28","doi-asserted-by":"crossref","DOI":"10.1002\/0471200697","volume-title":"Digital communication over fading channels","author":"MK Simon","year":"2000","unstructured":"Simon, M. K., & Alouini, M.-S. (2000). Digital communication over fading channels. New York: Wiley."},{"key":"4518_CR29","volume-title":"Probability, random variables and stochastic processes","author":"A Papoulis","year":"2002","unstructured":"Papoulis, A., & Pillai, S. U. (2002). Probability, random variables and stochastic processes. New York: McGraw-Hill Book Company."},{"issue":"4","key":"4518_CR30","first-page":"501","volume":"21","author":"M Akkouchi","year":"2008","unstructured":"Akkouchi, M. (2008). On the convolution of exponential distributions. The Journal of Chungcheong Mathematical Society, 21(4), 501\u2013510.","journal-title":"The Journal of Chungcheong Mathematical Society"},{"key":"4518_CR31","volume-title":"Integrals and series, volume 1: Elementary functions","author":"AP Prudnikov","year":"1986","unstructured":"Prudnikov, A. P., Brychkov, Y., & Marichev, O. (1986). Integrals and series, volume 1: Elementary functions. New York: Gordon & Breach Science Publishers."},{"key":"4518_CR32","volume-title":"Integrals and series, volume 2: Special functions","author":"AP Prudnikov","year":"1986","unstructured":"Prudnikov, A. P., Brychkov, Y., & Marichev, O. (1986). Integrals and series, volume 2: Special functions. New York: Gordon & Breach Science Publishers."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4518-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4518-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4518-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T15:10:21Z","timestamp":1569942621000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4518-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,25]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["4518"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4518-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,25]]}}}