{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:19:21Z","timestamp":1761401961697,"version":"3.41.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13635-018-0077-8","type":"journal-article","created":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T14:24:40Z","timestamp":1527603880000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Secrecy outage of threshold-based cooperative relay network with and without direct links"],"prefix":"10.1186","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6218-5301","authenticated-orcid":false,"given":"Khyati","family":"Chopra","sequence":"first","affiliation":[]},{"given":"Ranjan","family":"Bose","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"issue":"10","key":"77_CR1","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1109\/JSAC.2013.131011","volume":"31","author":"Y Zou","year":"2013","unstructured":"Y Zou, X Wang, W Shen, Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 31(10), 2099\u20132111 (2013).","journal-title":"IEEE J. Sel. Areas Commun"},{"issue":"12","key":"77_CR2","doi-asserted-by":"publisher","first-page":"6076","DOI":"10.1109\/TWC.2013.110813.121671","volume":"12","author":"VNQ Bao","year":"2013","unstructured":"VNQ Bao, N Linh-Trung, M Debbah, Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers. IEEE Trans. Wirel. Commun.12(12), 6076\u20136085 (2013).","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"5","key":"77_CR3","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/TCOMM.2015.2409171","volume":"63","author":"T-X Zheng","year":"2015","unstructured":"T-X Zheng, H-M Wang, F Liu, MH Lee, Outage constrained secrecy throughput maximization for DF relay networks. IEEE Trans. Commun.63(5), 1741\u20131755 (2015).","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"77_CR4","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/TIT.2005.862084","volume":"52","author":"TE Hunter","year":"2006","unstructured":"TE Hunter, S Sanayei, A Nosratinia, Outage analysis of coded cooperation. IEEE Trans. Inf. Theory. 52(2), 375\u2013391 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"77_CR5","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"AD Wyner, The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355\u20131387 (1975).","journal-title":"Bell Syst. Tech. J"},{"issue":"10","key":"77_CR6","doi-asserted-by":"publisher","first-page":"5003","DOI":"10.1109\/TWC.2009.090323","volume":"8","author":"I Krikidis","year":"2009","unstructured":"I Krikidis, JS Thompson, S McLaughlin, Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 8(10), 5003\u20135011 (2009).","journal-title":"IEEE Trans. Wirel. Commun"},{"issue":"9","key":"77_CR7","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Y Zou, J Zhu, X Wang, L Hanzo, A survey on wireless security: technical challenges, recent advances, and future trends.Proc. IEEE. 104(9), 1727\u20131765 (2016).","journal-title":"IEEE"},{"issue":"6","key":"77_CR8","doi-asserted-by":"publisher","first-page":"3827","DOI":"10.1109\/TWC.2017.2689005","volume":"16","author":"TX Zheng","year":"2017","unstructured":"TX Zheng, HM Wang, J Yuan, Z Han, MH Lee, Physical layer security in wireless ad hoc networks under a hybrid full-\/half-duplex receiver deployment strategy. IEEE Trans. Wirel. Commun. 16(6), 3827\u20133839 (2017).","journal-title":"IEEE Trans. Wirel. Commun"},{"issue":"2","key":"77_CR9","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1109\/TWC.2016.2645200","volume":"16","author":"Y Zou","year":"2017","unstructured":"Y Zou, Physical-layer security for spectrum sharing systems. IEEE Trans. Wirel. Commun. 16(2), 1319\u20131329 (2017).","journal-title":"IEEE Trans. Wirel. Commun"},{"issue":"1","key":"77_CR10","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1109\/TWC.2015.2472527","volume":"15","author":"F Zhu","year":"2016","unstructured":"F Zhu, F Gao, T Zhang, K Sun, M Yao, Physical-layer security for full duplex communications with self-interference mitigation. IEEE Trans. Wirel. Commun. 15(1), 329\u2013340 (2016).","journal-title":"IEEE Trans. Wirel. Commun"},{"issue":"10","key":"77_CR11","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1109\/LCOMM.2014.2339323","volume":"18","author":"A Jindal","year":"2014","unstructured":"A Jindal, C Kundu, R Bose, Secrecy outage of dual-hop AF relay system with relay selection without eavesdropper\u2019s CSI. IEEE Commun. Lett. 18(10), 1759\u20131762 (2014).","journal-title":"IEEE Commun. Lett"},{"key":"77_CR12","doi-asserted-by":"publisher","first-page":"5039","DOI":"10.1109\/TCOMM.2015.2494012","volume":"12","author":"TM Hoang","year":"2015","unstructured":"TM Hoang, TQ Duong, HA Suraweera, C Tellambura, HV Poor, Cooperative beamforming and user selection for improving the security of relay-aided systems. IEEE Trans. Commun. 12:, 5039\u20135051 (2015).","journal-title":"IEEE Trans. Commun"},{"key":"77_CR13","doi-asserted-by":"crossref","unstructured":"K-S Hwang, M Ju, in Proceedings IEEE International Conference on Communications (ICC). Secrecy outage probability of amplify-and-forward transmission with multi-antenna relay in presence of eavesdropper (IEEE, 2014), pp. 5408\u20135412.","DOI":"10.1109\/ICC.2014.6884181"},{"issue":"6","key":"77_CR14","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/LCOMM.2007.070065","volume":"11","author":"J Hu","year":"2007","unstructured":"J Hu, NC Beaulieu, Performance analysis of decode-and-forward relaying with selection combining. IEEE Commun. Lett. 11(6), 489\u2013491 (2007).","journal-title":"IEEE Commun. Lett"},{"key":"77_CR15","doi-asserted-by":"crossref","unstructured":"J Li, S Luo, AP Petropulu, in Proceedings IEEE Global Communications Conference (GLOBECOM). Outage secrecy rate in wireless relay channels using cooperative jamming (IEEE, 2012), pp. 2438\u20132443.","DOI":"10.1109\/GLOCOM.2012.6503482"},{"issue":"10","key":"77_CR16","doi-asserted-by":"publisher","first-page":"1811","DOI":"10.1109\/LCOMM.2014.2352298","volume":"18","author":"S Tomasin","year":"2014","unstructured":"S Tomasin, Routing over multi-hop fading wiretap networks with secrecy outage probability constraint. IEEE Commun. Lett. 18(10), 1811\u20131814 (2014).","journal-title":"IEEE Commun. Lett"},{"key":"77_CR17","doi-asserted-by":"crossref","unstructured":"D-D Tran, N-S Vo, T-L Vo, D-B Ha, in Proceedings IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA). Physical layer secrecy performance of multi-hop decode-and-forward relay networks with multiple eavesdroppers (IEEE, 2015), pp. 430\u2013435.","DOI":"10.1109\/WAINA.2015.33"},{"issue":"3","key":"77_CR18","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/WCL.2012.030512.110156","volume":"2","author":"X Wang","year":"2014","unstructured":"X Wang, YXu M Tao, Outage analysis of cooperative secrecy multicast transmission. IEEE Wirel. Commun. Lett. 2(3), 161\u2013164 (2014).","journal-title":"IEEE Wirel. Commun. Lett"},{"key":"77_CR19","doi-asserted-by":"crossref","unstructured":"ER Alotaibi, KA Hamdi, in Proceedings IEEE Wireless Communications and Networking Conference (WCNC). Secrecy outage probability of relay networking in multiple destination and eavesdropper scenarios (IEEE, 2014), pp. 2390\u20132395.","DOI":"10.1109\/WCNC.2014.6952723"},{"key":"77_CR20","doi-asserted-by":"crossref","unstructured":"X Chen, L Lei, H Zhang, C Yuen, in Proceedings IEEE International Conference on Communications (ICC). On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI (IEEE, 2014), pp. 2052\u20132057.","DOI":"10.1109\/ICC.2014.6883625"},{"key":"77_CR21","doi-asserted-by":"crossref","unstructured":"H Alves, G Brante, R Demo Souza, DB da Costa, M Latva-aho, in Proceedings IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). On the performance of full-duplex relaying under phy security constraints (IEEE, 2014), pp. 3978\u20133981.","DOI":"10.1109\/ICASSP.2014.6854348"},{"issue":"8","key":"77_CR22","doi-asserted-by":"publisher","first-page":"4614","DOI":"10.1109\/TWC.2015.2423290","volume":"14","author":"C Kundu","year":"2015","unstructured":"C Kundu, S Ghose, R Bose, Secrecy outage of dual-hop regenerative multi-relay system with relay selection. IEEE Trans. Wirel. Commun. 14(8), 4614\u20134625 (2015).","journal-title":"IEEE Trans. Wirel. Commun"},{"key":"77_CR23","doi-asserted-by":"crossref","unstructured":"T Li, T Zhang, B Zhong, Z Zhang, AV Vasilakos, in Proceedings IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). Physical layer security via maximal ratio combining and relay selection over Rayleigh fading channel (IEEE, 2015), pp. 612\u2013616.","DOI":"10.1109\/PIMRC.2015.7343372"},{"key":"77_CR24","doi-asserted-by":"crossref","unstructured":"C Cai, Y Cai, W Yang, W Yang, in Proceedings International Conference on Wireless Communications and Signal Processing. Average secrecy rate analysis with relay selection using decode-and-forward strategy in cooperative networks (IEEE, 2013), pp. 1\u20134.","DOI":"10.1515\/freq-2012-0120"},{"issue":"16","key":"77_CR25","doi-asserted-by":"publisher","first-page":"1980","DOI":"10.1049\/iet-com.2015.0109","volume":"9","author":"Y Zhou","year":"2015","unstructured":"Y Zhou, G Pan, T Li, H Liu, C Tang, Y Chen, Secrecy outage performance for partial relay selection schemes in cooperative systems. IET Commun.9(16), 1980\u20131987 (2015).","journal-title":"IET Commun."},{"issue":"4","key":"77_CR26","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/TCCN.2017.2758372","volume":"3","author":"H Lei","year":"2017","unstructured":"H Lei, H Zhang, IS Ansari, Z Ren, G Pan, KA Qaraqe, MS Alouini, On Secrecy Outage of Relay Selection in Underlay Cognitive Radio Networks Over Nakagami-m Fading Channels. IEEE Trans. Cogn. Commun. Netw. 3(4), 614\u2013627 (2017).","journal-title":"IEEE Trans. Cogn. Commun. Netw"},{"issue":"9","key":"77_CR27","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1049\/iet-com.2016.0917","volume":"11","author":"K Chopra","year":"2017","unstructured":"K Chopra, R Bose, A Joshi, Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network. IET Commun.11(9), 1396\u20131406 (2017).","journal-title":"IET Commun."},{"issue":"5","key":"77_CR28","doi-asserted-by":"publisher","first-page":"1756","DOI":"10.1109\/TCOMM.2015.2412939","volume":"63","author":"FS Al-Qahtani","year":"2015","unstructured":"FS Al-Qahtani, C Zhong, HM Alnuweiri, Opportunistic relay selection for secrecy enhancement in cooperative networks. IEEE Trans. Commun. 63(5), 1756\u20131770 (2015).","journal-title":"IEEE Trans. Commun"},{"issue":"15","key":"77_CR29","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.1049\/iet-com.2009.0634","volume":"4","author":"I Krikidis","year":"2010","unstructured":"I Krikidis, Opportunistic relay selection for cooperative networks with secrecy constraints. IET Commun.4(15), 1787\u20131791 (2010).","journal-title":"IET Commun."},{"key":"77_CR30","doi-asserted-by":"crossref","unstructured":"B Van Nguyen, K Kim, in Proceedings IEEE International Workshop on Information Forensics and Security (WIFS). Single relay selection for secure communication in a cooperative system with multiple full-duplex decode-and-forward relays (IEEE, 2015), pp. 1\u20136.","DOI":"10.1109\/WIFS.2015.7368590"},{"issue":"2","key":"77_CR31","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TCOMM.2016.2618793","volume":"65","author":"R Zhao","year":"2017","unstructured":"R Zhao, Y Yuan, L Fan, YC He, Secrecy performance analysis of cognitive decode-and-forward relay networks in Nakagami-m fading channels. IEEE Trans. Commun. 65(2), 549\u2013563 (2017).","journal-title":"IEEE Trans. Commun"},{"issue":"8","key":"77_CR32","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1049\/iet-com.2013.0349","volume":"8","author":"MZI Sarkar","year":"2014","unstructured":"MZI Sarkar, T Ratnarajah, Z Ding, Beamforming with opportunistic relaying for wireless security. IET Commun.8(8), 1198\u20131210 (2014).","journal-title":"IET Commun."},{"key":"77_CR33","doi-asserted-by":"crossref","unstructured":"Z Pengyu, Y Jian, C Jianshu, W Jian, Y Jin, in Proceedings IEEE Wireless Communications and Networking Conference (WCNC). Analyzing Amplify-and-Forward and Decode-and-Forward Cooperative Strategies in Wyner\u2019s Channel Model (IEEE, 2009), pp. 1\u20135.","DOI":"10.1109\/WCNC.2009.4917597"},{"key":"77_CR34","doi-asserted-by":"crossref","unstructured":"T Wang, in Proceedings 5th IEEE International Conference on Broadband Network & Multimedia Technology (IC-BNMT). Comparison of the energy efficiency for decode-and-forward and amplify-and-forward two-way relaying (IEEE, 2013), pp. 232\u2013236.","DOI":"10.1109\/ICBNMT.2013.6823948"},{"key":"77_CR35","unstructured":"G Levin, S Loyka, in Proceedings 22nd International Zurich Seminar on Communications (IZS). Amplify-and-forward versus decode-and-forward relaying: which is better? (Eidgen\u00f6ssische Technische Hochschule Zurich, 2012), pp. 123\u2013126."},{"issue":"8","key":"77_CR36","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1049\/iet-com.2015.1060","volume":"10","author":"S Ghose","year":"2016","unstructured":"S Ghose, C Kundu, R Bose, Secrecy performance of dual-hop decode-and-forward relay system with diversity combining at the eavesdropper. IET Commun.10(8), 904\u2013914 (2016).","journal-title":"IET Commun."},{"key":"77_CR37","volume-title":"Digital Communications","author":"J Proakis","year":"2001","unstructured":"J Proakis, Digital Communications, 4th edn (McGraw-Hill, New York, 2001)."},{"key":"77_CR38","doi-asserted-by":"crossref","unstructured":"J Barros, MR Rodrigues, in Proceedings IEEE International Symposium on Information Theory. Secrecy capacity of wireless channels (IEEE, 2006), pp. 356\u2013360.","DOI":"10.1109\/ISIT.2006.261613"},{"key":"77_CR39","doi-asserted-by":"crossref","unstructured":"T Lu, P Liu, S Panwar, in Proceedings IEEE 81st Vehicular Technology Conference (VTC Spring). Shining a light into the darkness: How cooperative relay communication mitigates correlated shadow fading (IEEE, 2015), pp. 1\u20137.","DOI":"10.1109\/VTCSpring.2015.7146082"},{"issue":"6","key":"77_CR40","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1109\/LCOMM.2017.2669976","volume":"21","author":"H Lei","year":"2017","unstructured":"H Lei, IS Ansari, G Pan, B Alomair, M-S Alouini, Secrecy capacity analysis over \u03b1\u2212\u03bc fading channels. IEEE Commun. Lett. 21(6), 1445\u20131448 (2017).","journal-title":"IEEE Commun. Lett"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-018-0077-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13635-018-0077-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-018-0077-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T20:41:17Z","timestamp":1751661677000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-018-0077-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["77"],"URL":"https:\/\/doi.org\/10.1186\/s13635-018-0077-8","relation":{},"ISSN":["2510-523X"],"issn-type":[{"type":"electronic","value":"2510-523X"}],"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"20 July 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"7"}}