{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T20:27:47Z","timestamp":1758400067596},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T00:00:00Z","timestamp":1658793600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T00:00:00Z","timestamp":1658793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s11432-021-3262-3","type":"journal-article","created":{"date-parts":[[2022,7,30]],"date-time":"2022-07-30T09:02:47Z","timestamp":1659171767000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Outage-driven link selection for secure buffer-aided networks"],"prefix":"10.1007","volume":"65","author":[{"given":"Dawei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tianmi","family":"He","sequence":"additional","affiliation":[]},{"given":"Fuhui","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Ruonan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qihui","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,26]]},"reference":[{"key":"3262_CR1","doi-asserted-by":"publisher","first-page":"029301","DOI":"10.1007\/s11432-017-9399-6","volume":"62","author":"G Wang","year":"2019","unstructured":"Wang G, Lin Y, Meng C, et al. Secrecy energy efficiency optimization for AN-aided SWIPT system with power splitting receiver. Sci China Inf Sci, 2019, 62: 029301","journal-title":"Sci China Inf Sci"},{"key":"3262_CR2","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MCOM.2018.1700439","volume":"56","author":"L Wang","year":"2018","unstructured":"Wang L, Wong K K, Jin S, et al. A new look at physical layer security, caching, and wireless energy harvesting for heterogeneous ultra-dense networks. IEEE Commun Mag, 2018, 56: 49\u201355","journal-title":"IEEE Commun Mag"},{"key":"3262_CR3","doi-asserted-by":"publisher","first-page":"029305","DOI":"10.1007\/s11432-016-9201-7","volume":"61","author":"C Xu","year":"2018","unstructured":"Xu C, Zeng P, Liang W, et al. Secure resource allocation for green and cognitive device-to-device communication. Sci China Inf Sci, 2018, 61: 029305","journal-title":"Sci China Inf Sci"},{"key":"3262_CR4","doi-asserted-by":"publisher","first-page":"022310","DOI":"10.1007\/s11432-016-9149-4","volume":"61","author":"X H Qi","year":"2018","unstructured":"Qi X H, Huang K Z, Li B, et al. Physical layer security in multi-antenna cognitive heterogeneous cellular networks: a unified secrecy performance analysis. Sci China Inf Sci, 2018, 61: 022310","journal-title":"Sci China Inf Sci"},{"key":"3262_CR5","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A D Wyner","year":"1975","unstructured":"Wyner A D. The wire-tap channel. Bell Syst Tech J, 1975, 54: 1355\u20131387","journal-title":"Bell Syst Tech J"},{"key":"3262_CR6","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csiszar","year":"1978","unstructured":"Csiszar I, Korner J. Broadcast channels with confidential messages. IEEE Trans Inform Theory, 1978, 24: 339\u2013348","journal-title":"IEEE Trans Inform Theory"},{"key":"3262_CR7","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"S Leung-Yan-Cheong","year":"1978","unstructured":"Leung-Yan-Cheong S, Hellman M. The Gaussian wire-tap channel. IEEE Trans Inform Theory, 1978, 24: 451\u2013456","journal-title":"IEEE Trans Inform Theory"},{"key":"3262_CR8","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCOM.2015.7355563","volume":"53","author":"L J Rodriguez","year":"2015","unstructured":"Rodriguez L J, Tran N H, Duong T Q, et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond. IEEE Commun Mag, 2015, 53: 32\u201339","journal-title":"IEEE Commun Mag"},{"key":"3262_CR9","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/TIFS.2019.2911162","volume":"15","author":"A Arafa","year":"2020","unstructured":"Arafa A, Shin W, Vaezi M, et al. Secure relaying in non-orthogonal multiple access: trusted and untrusted scenarios. IEEE Trans Inform Forensic Secur, 2020, 15: 210\u2013222","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"3262_CR10","doi-asserted-by":"publisher","first-page":"11323","DOI":"10.1109\/TVT.2020.3010008","volume":"69","author":"J T Lim","year":"2020","unstructured":"Lim J T, Lee K, Han Y. Secure communication with outdated channel state information via untrusted relay capable of energy harvesting. IEEE Trans Veh Technol, 2020, 69: 11323\u201311337","journal-title":"IEEE Trans Veh Technol"},{"key":"3262_CR11","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/TIFS.2020.3005336","volume":"16","author":"Z Abdullah","year":"2021","unstructured":"Abdullah Z, Chen G, Abdullah M A M, et al. Enhanced secrecy performance of multihop IoT networks with cooperative hybrid-duplex jamming. IEEE Trans Inform Forensic Secur, 2021, 16: 161\u2013172","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"3262_CR12","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1109\/TIFS.2017.2765500","volume":"13","author":"J Lin","year":"2018","unstructured":"Lin J, Li Q, Yang J, et al. Physical-layer security for proximal legitimate user and eavesdropper: a frequency diverse array beamforming approach. IEEE Trans Inform Forensic Secur, 2018, 13: 671\u2013684","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"3262_CR13","doi-asserted-by":"publisher","first-page":"10786","DOI":"10.1109\/JIOT.2019.2941873","volume":"6","author":"Z Deng","year":"2019","unstructured":"Deng Z, Li Q, Zhang Q, et al. Beamforming design for physical layer security in a two-way cognitive radio IoT network with SWIPT. IEEE Int Things J, 2019, 6: 10786\u201310798","journal-title":"IEEE Int Things J"},{"key":"3262_CR14","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/TCOMM.2017.2747554","volume":"66","author":"R Zhao","year":"2018","unstructured":"Zhao R, Lin H, He Y C, et al. Secrecy performance of transmit antenna selection for MIMO relay systems with outdated CSI. IEEE Trans Commun, 2018, 66: 546\u2013559","journal-title":"IEEE Trans Commun"},{"key":"3262_CR15","doi-asserted-by":"publisher","first-page":"7599","DOI":"10.1109\/TVT.2017.2669240","volume":"66","author":"L Fan","year":"2017","unstructured":"Fan L, Lei X, Yang N, et al. Secrecy cooperative networks with outdated relay selection over correlated fading channels. IEEE Trans Veh Technol, 2017, 66: 7599\u20137603","journal-title":"IEEE Trans Veh Technol"},{"key":"3262_CR16","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1109\/TWC.2015.2472527","volume":"15","author":"F C Zhu","year":"2016","unstructured":"Zhu F C, Gao F F, Zhang T, et al. Physical-layer security for full duplex communications with self-interference mitigation. IEEE Trans Wirel Commun, 2016, 15: 329\u2013340","journal-title":"IEEE Trans Wirel Commun"},{"key":"3262_CR17","doi-asserted-by":"publisher","first-page":"3827","DOI":"10.1109\/TWC.2017.2689005","volume":"16","author":"T X Zheng","year":"2017","unstructured":"Zheng T X, Wang H M, Yuan J, et al. Physical layer security in wireless ad hoc networks under a hybrid full-\/half-duplex receiver deployment strategy. IEEE Trans Wirel Commun, 2017, 16: 3827\u20133839","journal-title":"IEEE Trans Wirel Commun"},{"key":"3262_CR18","doi-asserted-by":"publisher","first-page":"3690","DOI":"10.1109\/TVT.2017.2774810","volume":"67","author":"W Ni","year":"2018","unstructured":"Ni W, Zhang J A, Fang Z, et al. Analysis of finite buffer in two-way relay: a queueing theoretic point of view. IEEE Trans Veh Technol, 2018, 67: 3690\u20133694","journal-title":"IEEE Trans Veh Technol"},{"key":"3262_CR19","doi-asserted-by":"publisher","first-page":"2826","DOI":"10.1109\/TCOMM.2018.2808287","volume":"66","author":"B R Manoj","year":"2018","unstructured":"Manoj B R, Mallik R K, Bhatnagar M R. Performance analysis of buffer-aided priority-based max-link relay selection in DF cooperative networks. IEEE Trans Commun, 2018, 66: 2826\u20132839","journal-title":"IEEE Trans Commun"},{"key":"3262_CR20","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1109\/TWC.2017.2767582","volume":"17","author":"M M Razlighi","year":"2018","unstructured":"Razlighi M M, Zlatanov N. Buffer-aided relaying for the two-hop full-duplex relay channel with self-interference. IEEE Trans Wirel Commun, 2018, 17: 477\u2013491","journal-title":"IEEE Trans Wirel Commun"},{"key":"3262_CR21","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1109\/TWC.2017.2772230","volume":"17","author":"R Morsi","year":"2018","unstructured":"Morsi R, Michalopoulos D S, Schober R. Performance analysis of near-optimal energy buffer aided wireless powered communication. IEEE Trans Wirel Commun, 2018, 17: 863\u2013881","journal-title":"IEEE Trans Wirel Commun"},{"key":"3262_CR22","doi-asserted-by":"publisher","first-page":"2567","DOI":"10.1109\/TVT.2016.2573378","volume":"66","author":"Z Tian","year":"2017","unstructured":"Tian Z, Gong Y, Chen G J, et al. Buffer-aided relay selection with reduced packet delay in cooperative networks. IEEE Trans Veh Technol, 2017, 66: 2567\u20132575","journal-title":"IEEE Trans Veh Technol"},{"key":"3262_CR23","doi-asserted-by":"publisher","first-page":"3311","DOI":"10.1109\/TIFS.2020.2988567","volume":"15","author":"X L Lan","year":"2020","unstructured":"Lan X L, Ren J J, Chen Q C, et al. Achievable secrecy rate region for buffer-aided multiuser MISO systems. IEEE Trans Inform Forensic Secur, 2020, 15: 3311\u20133324","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"3262_CR24","doi-asserted-by":"publisher","first-page":"6485","DOI":"10.1109\/TVT.2020.2988357","volume":"69","author":"J J Ren","year":"2020","unstructured":"Ren J J, Lei X F, Diamantoulakis P D, et al. Buffer-aided secure relay networks with SWIPT. IEEE Trans Veh Technol, 2020, 69: 6485\u20136499","journal-title":"IEEE Trans Veh Technol"},{"key":"3262_CR25","doi-asserted-by":"publisher","first-page":"7635","DOI":"10.1109\/TWC.2018.2869089","volume":"17","author":"J Wan","year":"2018","unstructured":"Wan J, Qiao D, Wang H M, et al. Buffer-aided two-hop secure communications with power control and link selection. IEEE Trans Wirel Commun, 2018, 17: 7635\u20137647","journal-title":"IEEE Trans Wirel Commun"},{"key":"3262_CR26","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1109\/TCOMM.2017.2776114","volume":"66","author":"D W Wang","year":"2018","unstructured":"Wang D W, Ren P Y, Cheng J L. Cooperative secure communication in two-hop buffer-aided networks. IEEE Trans Commun, 2018, 66: 972\u2013985","journal-title":"IEEE Trans Commun"},{"key":"3262_CR27","first-page":"95","volume":"65","author":"Q Zhang","year":"2017","unstructured":"Zhang Q, Liang Z J, Li Q Z, et al. Buffer-aided non-orthogonal multiple access relaying systems in Rayleigh fading channels. IEEE Trans Commun, 2017, 65: 95\u2013106","journal-title":"IEEE Trans Commun"},{"key":"3262_CR28","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1109\/TIFS.2014.2307672","volume":"9","author":"G J Chen","year":"2014","unstructured":"Chen G J, Tian Z, Gong Y, et al. Max-ratio relay selection in secure buffer-aided cooperative wireless networks. IEEE Trans Inform Forensic Secur, 2014, 9: 719\u2013729","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"3262_CR29","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1109\/TIFS.2018.2854711","volume":"14","author":"R Nakai","year":"2019","unstructured":"Nakai R, Sugiura S. Physical layer security in buffer-state-based max-ratio relay selection exploiting broadcasting with cooperative beamforming and jamming. IEEE Trans Inform Forensic Secur, 2019, 14: 431\u2013444","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"3262_CR30","doi-asserted-by":"publisher","first-page":"5818","DOI":"10.1109\/TWC.2018.2850016","volume":"17","author":"Y Gong","year":"2018","unstructured":"Gong Y, Chen G J, Xie T. Using buffers in trust-aware relay selection networks with spatially random relays. IEEE Trans Wirel Commun, 2018, 17: 5818\u20135826","journal-title":"IEEE Trans Wirel Commun"},{"key":"3262_CR31","first-page":"2035","volume":"67","author":"X X Tang","year":"2018","unstructured":"Tang X X, Cai Y M, Huang Y Z, et al. Secrecy outage analysis of buffer-aided cooperative MIMO relaying systems. IEEE Trans Veh Technol, 2018, 67: 2035\u20132048","journal-title":"IEEE Trans Veh Technol"},{"key":"3262_CR32","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1109\/TWC.2017.2786258","volume":"17","author":"X N Liao","year":"2018","unstructured":"Liao X N, Zhang Y Y, Wu Z Q, et al. On security-delay trade-off in two-hop wireless networks with buffer-aided relay selection. IEEE Trans Wirel Commun, 2018, 17: 1893\u20131906","journal-title":"IEEE Trans Wirel Commun"},{"key":"3262_CR33","doi-asserted-by":"publisher","first-page":"102039","DOI":"10.1016\/j.adhoc.2019.102039","volume":"98","author":"X N Liao","year":"2020","unstructured":"Liao X N, Zhang Y Y, Wu Z Q, et al. Buffer-aided relay selection for secure two-hop wireless networks with decode-and-forward relays and a diversity-combining eavesdropper. Ad Hoc Netw, 2020, 98: 102039","journal-title":"Ad Hoc Netw"},{"key":"3262_CR34","doi-asserted-by":"publisher","first-page":"2074","DOI":"10.1109\/JSAC.2020.3000888","volume":"38","author":"H S Zhang","year":"2020","unstructured":"Zhang H S, Zhang H J, Liu W, et al. Energy efficient user clustering, hybrid precoding and power optimization in terahertz MIMO-NOMA systems. IEEE J Sel Areas Commun, 2020, 38: 2074\u20132085","journal-title":"IEEE J Sel Areas Commun"},{"key":"3262_CR35","doi-asserted-by":"publisher","first-page":"2798","DOI":"10.1109\/JSAC.2020.3005489","volume":"38","author":"H J Zhang","year":"2020","unstructured":"Zhang H J, Zhang J M, Long K P. Energy efficiency optimization for NOMA UAV network with imperfect CSI. IEEE J Sel Areas Commun, 2020, 38: 2798\u20132809","journal-title":"IEEE J Sel Areas Commun"},{"key":"3262_CR36","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/JSAC.2020.3018807","volume":"39","author":"M L Ke","year":"2021","unstructured":"Ke M L, Gao Z, Wu Y P, et al. Massive access in cell-free massive MIMO-based Internet of Things: cloud computing and edge computing paradigms. IEEE J Sel Areas Commun, 2021, 39: 756\u2013772","journal-title":"IEEE J Sel Areas Commun"},{"key":"3262_CR37","doi-asserted-by":"publisher","unstructured":"Liao A W, Gao Z, Wang D M, et al. Terahertz ultra-massive MIMO-based aeronautical communications in space-air-ground integrated networks. IEEE J Sel Commun, 2021. doi: https:\/\/doi.org\/10.1109\/JSAC.2021.3071834","DOI":"10.1109\/JSAC.2021.3071834"},{"key":"3262_CR38","doi-asserted-by":"publisher","first-page":"5747","DOI":"10.1109\/TCOMM.2020.3003665","volume":"68","author":"K R Cao","year":"2020","unstructured":"Cao K R, Wang B H, Ding H Y, et al. On the security enhancement of uplink NOMA systems with jammer selection. IEEE Trans Commun, 2020, 68: 5747\u20135763","journal-title":"IEEE Trans Commun"},{"key":"3262_CR39","doi-asserted-by":"publisher","first-page":"2163","DOI":"10.1109\/TWC.2019.2963181","volume":"19","author":"X W Yue","year":"2020","unstructured":"Yue X W, Liu Y W, Yao Y Y, et al. Secure communications in a unified non-orthogonal multiple access framework. IEEE Trans Wirel Commun, 2020, 19: 2163\u20132178","journal-title":"IEEE Trans Wirel Commun"},{"key":"3262_CR40","doi-asserted-by":"publisher","first-page":"220304","DOI":"10.1007\/s11432-019-2836-0","volume":"63","author":"W Y Jiang","year":"2020","unstructured":"Jiang W Y, Huang K Z, Xiao S F, et al. Secure transmission for heterogeneous cellular network with limited feedback. Sci China Inf Sci, 2020, 63: 220304","journal-title":"Sci China Inf Sci"},{"key":"3262_CR41","volume-title":"Table of Integrals, Series, and Products","author":"I S Gradshteyn","year":"2014","unstructured":"Gradshteyn I S, Ryzhik I M. Table of Integrals, Series, and Products. Orlando: Academic Press, 2014"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-021-3262-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-021-3262-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-021-3262-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T21:02:51Z","timestamp":1693774971000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-021-3262-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,26]]},"references-count":41,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["3262"],"URL":"https:\/\/doi.org\/10.1007\/s11432-021-3262-3","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,26]]},"assertion":[{"value":"21 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"182303"}}