{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:32:19Z","timestamp":1761744739930,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,4,16]],"date-time":"2018-04-16T00:00:00Z","timestamp":1523836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61501376"],"award-info":[{"award-number":["61501376"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Technology Foundation for Selected Overseas Chinese Scholar in Shaanxi Province","award":["W021004"],"award-info":[{"award-number":["W021004"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["3102016ZY020"],"award-info":[{"award-number":["3102016ZY020"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11277-018-5762-x","type":"journal-article","created":{"date-parts":[[2018,4,16]],"date-time":"2018-04-16T09:16:45Z","timestamp":1523870205000},"page":"1281-1293","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Optimal Power Allocation in an Amplify-and-Forward Untrusted Relay Network with Imperfect Channel State Information"],"prefix":"10.1007","volume":"101","author":[{"given":"Tamer","family":"Mekkawy","sequence":"first","affiliation":[]},{"given":"Rugui","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,16]]},"reference":[{"key":"5762_CR1","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/MCOM.2016.7537191","volume":"54","author":"N Zhao","year":"2016","unstructured":"Zhao, N., Yu, F. R., Li, M., & Yan, Q. (2016). Physical layer security issues in interference-alignment-based wireless networks. IEEE Communications Magazine, 54, 162\u2013168.","journal-title":"IEEE Communications Magazine"},{"key":"5762_CR2","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"S Goel","year":"2008","unstructured":"Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7, 2180\u20132189.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"5762_CR3","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/TWC.2014.2332164","volume":"14","author":"HM Wang","year":"2015","unstructured":"Wang, H. M., Zheng, T., & Xia, X. G. (2015). Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise versus artificial fast fading. IEEE Transactions on Wireless Communications, 14, 94\u2013106.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"5762_CR4","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/TCOMM.2016.2536027","volume":"64","author":"R Yao","year":"2016","unstructured":"Yao, R., Liu, Y., Lu, L., & Li, G. (2016). Cooperative precoding for cognitive transmission in two-tier networks. IEEE Transactions on Communications, 64, 1423\u20131436.","journal-title":"IEEE Transactions on Communications"},{"key":"5762_CR5","doi-asserted-by":"publisher","first-page":"291","DOI":"10.4218\/etrij.16.0115.0023","volume":"38","author":"R Yao","year":"2016","unstructured":"Yao, R., Xu, J., Li, G., & Wang, L. (2016). Optimized BD-ZF precoder for multiuser MIMO\u2013VFDM cognitive transmission. ETRI Journal, 38, 291\u2013301.","journal-title":"ETRI Journal"},{"key":"5762_CR6","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2010","unstructured":"Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58, 1875\u20131888.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"5762_CR7","doi-asserted-by":"publisher","first-page":"4985","DOI":"10.1109\/TSP.2011.2159598","volume":"59","author":"J Li","year":"2011","unstructured":"Li, J., Petropulu, A. P., & Weber, S. (2011). On cooperative relaying schemes for wireless physical layer security. IEEE Transactions on Signal Processing, 59, 4985\u20134997.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"5762_CR8","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/TWC.2014.2354635","volume":"14","author":"C Wang","year":"2015","unstructured":"Wang, C., Wang, H. M., & Xia, X. G. (2015). Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Transactions on Wireless Communications, 14, 589\u2013605.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"5762_CR9","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1080\/00207217.2016.1218063","volume":"104","author":"SQ Nguyen","year":"2017","unstructured":"Nguyen, S. Q., & Kong, H. Y. (2017). Secrecy enhancement in two-hop DF relaying system under hardware impairment. International Journal of Electronics, 104, 442\u2013461.","journal-title":"International Journal of Electronics"},{"key":"5762_CR10","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s11277-013-1351-1","volume":"75","author":"N Zhou","year":"2014","unstructured":"Zhou, N., Chen, X., Li, C., & Xue, Z. (2014). Secrecy rate of two-hop AF relaying networks with an untrusted relay. Wireless Personal Communications, 75, 119\u2013129.","journal-title":"Wireless Personal Communications"},{"key":"5762_CR11","doi-asserted-by":"publisher","first-page":"3807","DOI":"10.1109\/TIT.2010.2050958","volume":"56","author":"X He","year":"2009","unstructured":"He, X., & Yener, A. (2009). Cooperation with an untrusted relay: A secrecy perspective. IEEE Transactions on Information Theory, 56, 3807\u20133827.","journal-title":"IEEE Transactions on Information Theory"},{"key":"5762_CR12","doi-asserted-by":"publisher","first-page":"3693","DOI":"10.1109\/TVT.2012.2209692","volume":"61","author":"R Zhang","year":"2012","unstructured":"Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Transactions on Vehicular Technology, 61, 3693\u20133704.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"5762_CR13","doi-asserted-by":"publisher","first-page":"2185","DOI":"10.1109\/TSP.2014.2307276","volume":"62","author":"J Mo","year":"2013","unstructured":"Mo, J., Tao, M., Liu, Y., & Wang, R. (2013). Secure beamforming for MIMO two-way communications with an untrusted relay. IEEE Transactions on Signal Processing, 62, 2185\u20132199.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"5762_CR14","doi-asserted-by":"publisher","first-page":"3467","DOI":"10.1109\/TCOMM.2016.2577686","volume":"64","author":"R El-Bardan","year":"2016","unstructured":"El-Bardan, R., Brahma, S., & Varshney, P. K. (2016). Strategic power allocation with incomplete information in the presence of a jammer. IEEE Transactions on Communications, 64, 3467\u20133479.","journal-title":"IEEE Transactions on Communications"},{"key":"5762_CR15","first-page":"831","volume":"103","author":"M Taki","year":"2016","unstructured":"Taki, M., & Sadeghi, M. (2016). Optimised secure transmission through untrusted AF relays using link adaptation. International Journal of Electronics, 103, 831\u2013840.","journal-title":"International Journal of Electronics"},{"key":"5762_CR16","doi-asserted-by":"publisher","first-page":"3801","DOI":"10.1109\/TVT.2012.2207438","volume":"61","author":"L Sun","year":"2012","unstructured":"Sun, L., Zhang, T., Li, Y., & Niu, H. (2012). Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes. IEEE Transactions on Vehicular Technology, 61, 3801\u20133807.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"5762_CR17","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/WCL.2014.031114.140018","volume":"3","author":"L Wang","year":"2014","unstructured":"Wang, L., Elkashlan, M., Huang, J., Tran, N. H., & Duong, T. Q. (2014). Secure transmission with optimal power allocation in untrusted relay networks. IEEE Wireless Communications Letters, 3, 289\u2013292.","journal-title":"IEEE Wireless Communications Letters"},{"key":"5762_CR18","doi-asserted-by":"crossref","unstructured":"Khattabi, Y. & Matalgah, M. M. (2015). Conventional and best-relay-selection cooperative protocols under nodes-mobility and imperfect-CSI impacts: BER performance. In Proceedings of IEEE wireless communications and networking conference (WCNC2015) (pp. 105\u2013110).","DOI":"10.1109\/WCNC.2015.7127453"},{"key":"5762_CR19","doi-asserted-by":"publisher","first-page":"4455","DOI":"10.1109\/TWC.2016.2542071","volume":"15","author":"S Salari","year":"2016","unstructured":"Salari, S., Amirani, M. Z., Kim, I.-M., Kim, D. I., & Yang, J. (2016). Distributed beamforming in two-way relay networks with interference and imperfect CSI. IEEE Transactions on Wireless Communications, 15, 4455\u20134469.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"5762_CR20","doi-asserted-by":"publisher","first-page":"3450","DOI":"10.1109\/TWC.2007.06020050","volume":"6","author":"A Bletsas","year":"2007","unstructured":"Bletsas, A., Shin, H., & Win, M. Z. (2007). Cooperative communications with outage-optimal opportunistic relaying. IEEE Transactions on Wireless Communications, 6, 3450\u20133460.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"5762_CR21","volume-title":"Table of integrals, series, and products","author":"A Jeffrey","year":"2007","unstructured":"Jeffrey, A., & Zwillinger, D. (2007). Table of integrals, series, and products. Cambridge, MA: Academic Press."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5762-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5762-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5762-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T19:50:06Z","timestamp":1555357806000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5762-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,16]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["5762"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5762-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,4,16]]},"assertion":[{"value":"16 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}