{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T11:59:04Z","timestamp":1757591944450,"version":"3.40.5"},"reference-count":39,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T00:00:00Z","timestamp":1625702400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Advanced Research Project of Civil Aerospace Technologies in 13th Five-Year Plan","award":["D010201","cstc2019yszx-jcyjX0006","cstc2020yszx-jscxX0004"],"award-info":[{"award-number":["D010201","cstc2019yszx-jcyjX0006","cstc2020yszx-jscxX0004"]}]},{"name":"Special Foundation for Chongqing Science and Technology","award":["D010201","cstc2019yszx-jcyjX0006","cstc2020yszx-jscxX0004"],"award-info":[{"award-number":["D010201","cstc2019yszx-jcyjX0006","cstc2020yszx-jscxX0004"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,7,8]]},"abstract":"<jats:p>Simultaneous wireless information and power transfer (SWIPT) is a major breakthrough in the field of low-power wireless information transmissions. In this paper, the secrecy performance of the SWIPT-enabled relay network with full-duplex destination-aided jamming is assessed, where both the power-splitting (PS) and time-switching (TS) schemes at the relay are considered with the linear and nonlinear energy harvesting models. The relay harvests energy from the confidential signal and artificial noise sent by the source and destination, respectively, and forwards the amplified signal to the destination, in the presence of an eavesdropper. The analytical closed-form expressions of the connection outage probability (COP), secrecy outage probability (SOP), and transmission outage probability (TOP) for PS- and TS-based schemes are derived, and the closed-form expression of the lower bound of ergodic secrecy capacity (ESC) is calculated. The asymptotic-form expressions of the COP, SOP, TOP, and ESC are further analyzed to capture the valuable information in the high SNR regime. Numerical results verify the correctness of analytical results, reveal the effects of the PS\/TS ratio, and transmit the signal-to-noise ratio on secrecy performance.<\/jats:p>","DOI":"10.1155\/2021\/6193012","type":"journal-article","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T20:20:09Z","timestamp":1625775609000},"page":"1-18","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of SWIPT-Enabled Relay Networks with Full-Duplex Destination-Aided Jamming"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3344-0702","authenticated-orcid":true,"given":"Jinglan","family":"Ou","sequence":"first","affiliation":[{"name":"College of Microelectronics and Communication Engineering, Chongqing University, Chongqing 400044, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2755-0219","authenticated-orcid":true,"given":"Hangchuan","family":"Shi","sequence":"additional","affiliation":[{"name":"College of Microelectronics and Communication Engineering, Chongqing University, Chongqing 400044, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Liubin","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Microelectronics and Communication Engineering, Chongqing University, Chongqing 400044, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0512-8751","authenticated-orcid":true,"given":"Rui","family":"Ma","sequence":"additional","affiliation":[{"name":"College of Microelectronics and Communication Engineering, Chongqing University, Chongqing 400044, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5648-8955","authenticated-orcid":true,"given":"Haowei","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Microelectronics and Communication Engineering, Chongqing University, Chongqing 400044, China"},{"name":"Center of Communication and Tracking Telemetry Command, Chongqing University, Chongqing 400044, China"},{"name":"Chongqing Key Laboratory of Space Information Network and Intelligent Information Fusion, Chongqing University, Chongqing 400044, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3035005"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2017.2783901"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08468-2"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2013.031813.120224"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2020.2971983"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.3017665"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/isit.2008.4595260"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2016.7462480"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2015.7081084"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2014.2368999"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2016.7462485"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2015.2395725"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2014.2303422"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2015.2395414"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6638405"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/iscit.2017.8261231"},{"issue":"13","key":"17","first-page":"2543","article-title":"Robust AN-aided secure beamforming and power splitting in wireless-powered AF relay networks","volume":"3","author":"H. Niu","year":"2019","journal-title":"IEEE Systems Journal"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2691798"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2830880"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2020.3002976"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2015.1147"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/globecom42002.2020.9322281"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2020.3043015"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2015.2478029"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2016.2572960"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3058504"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2018.2865968"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2019.2907627"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2018.2877393"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2015.2415480"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/iceiec.2017.8076513"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2015.2478460"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2017.2734665"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2015.2453418"},{"key":"35","volume-title":"Table of Integrals, Series, and Products","author":"I. S. Gradshteyn","year":"2015","edition":"8th"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2018.5502"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2018.2848648"},{"key":"38","volume-title":"Handbook of Mathematical Functions","author":"M. Abramowitz","year":"1965","edition":"2th"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2013.06.040"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6193012.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6193012.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6193012.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T20:20:17Z","timestamp":1625775617000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6193012\/"}},"subtitle":[],"editor":[{"given":"Savio","family":"Sciancalepore","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2021,7,8]]},"references-count":39,"alternative-id":["6193012","6193012"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6193012","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,7,8]]}}}