{"id":"https:\/\/openalex.org\/W3016011280","doi":"https:\/\/doi.org\/10.1109\/lwc.2020.2986404","title":"Secure Transmission in Wiretap Channels Using Full-Duplex Relay-Aided D2D Communications With Outdated CSI","display_name":"Secure Transmission in Wiretap Channels Using Full-Duplex Relay-Aided D2D Communications With Outdated CSI","publication_year":2020,"publication_date":"2020-04-08","ids":{"openalex":"https:\/\/openalex.org\/W3016011280","doi":"https:\/\/doi.org\/10.1109\/lwc.2020.2986404","mag":"3016011280"},"language":"en","primary_location":{"id":"doi:10.1109\/lwc.2020.2986404","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1109\/lwc.2020.2986404","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https:\/\/openalex.org\/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5009861824","display_name":"Majid H. Khoshafa","orcid":"https:\/\/orcid.org\/0000-0002-8882-6952"},"institutions":[{"id":"https:\/\/openalex.org\/I130438778","display_name":"Memorial University of Newfoundland","ror":"https:\/\/ror.org\/04haebc03","country_code":"CA","type":"education","lineage":["https:\/\/openalex.org\/I130438778"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Majid H. Khoshafa","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Memorial University of Newfoundland, St. John&#x2019;s, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Memorial University of Newfoundland, St. John&#x2019;s, Canada","institution_ids":["https:\/\/openalex.org\/I130438778"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5009312675","display_name":"Telex M. N. Ngatched","orcid":"https:\/\/orcid.org\/0000-0001-7646-9452"},"institutions":[{"id":"https:\/\/openalex.org\/I130438778","display_name":"Memorial University of Newfoundland","ror":"https:\/\/ror.org\/04haebc03","country_code":"CA","type":"education","lineage":["https:\/\/openalex.org\/I130438778"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Telex M. N. Ngatched","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Memorial University of Newfoundland, St. John&#x2019;s, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Memorial University of Newfoundland, St. John&#x2019;s, Canada","institution_ids":["https:\/\/openalex.org\/I130438778"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5075820901","display_name":"Mohamed H. Ahmed","orcid":"https:\/\/orcid.org\/0000-0002-3477-0834"},"institutions":[{"id":"https:\/\/openalex.org\/I153718931","display_name":"University of Ottawa","ror":"https:\/\/ror.org\/03c4mmv16","country_code":"CA","type":"education","lineage":["https:\/\/openalex.org\/I153718931"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohamed H. Ahmed","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, Canada","institution_ids":["https:\/\/openalex.org\/I153718931"]}]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5101735294","display_name":"Ahmed Ibrahim","orcid":null},"institutions":[{"id":"https:\/\/openalex.org\/I67031392","display_name":"Carleton University","ror":"https:\/\/ror.org\/02qtvee93","country_code":"CA","type":"education","lineage":["https:\/\/openalex.org\/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ahmed Ibrahim","raw_affiliation_strings":["Department of Systems and Computer Engineering, Carleton University, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Systems and Computer Engineering, Carleton University, Ottawa, Canada","institution_ids":["https:\/\/openalex.org\/I67031392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https:\/\/openalex.org\/A5009861824"],"corresponding_institution_ids":["https:\/\/openalex.org\/I130438778"],"apc_list":null,"apc_paid":null,"fwci":2.0812,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.87157965,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"9","issue":"8","first_page":"1216","last_page":"1220"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T12791","display_name":"Full-Duplex Wireless Communications","score":0.9998000264167786,"subfield":{"id":"https:\/\/openalex.org\/subfields\/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https:\/\/openalex.org\/fields\/22","display_name":"Engineering"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T12791","display_name":"Full-Duplex Wireless Communications","score":0.9998000264167786,"subfield":{"id":"https:\/\/openalex.org\/subfields\/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https:\/\/openalex.org\/fields\/22","display_name":"Engineering"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10964","display_name":"Wireless Communication Security Techniques","score":0.9987000226974487,"subfield":{"id":"https:\/\/openalex.org\/subfields\/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https:\/\/openalex.org\/fields\/22","display_name":"Engineering"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9836999773979187,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/eavesdropping","display_name":"Eavesdropping","score":0.8632322549819946},{"id":"https:\/\/openalex.org\/keywords\/underlay","display_name":"Underlay","score":0.8357134461402893},{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.7607035636901855},{"id":"https:\/\/openalex.org\/keywords\/computer-network","display_name":"Computer network","score":0.7564735412597656},{"id":"https:\/\/openalex.org\/keywords\/relay","display_name":"Relay","score":0.6787729263305664},{"id":"https:\/\/openalex.org\/keywords\/channel-state-information","display_name":"Channel state information","score":0.5905479192733765},{"id":"https:\/\/openalex.org\/keywords\/transmission","display_name":"Transmission (telecommunications)","score":0.574312686920166},{"id":"https:\/\/openalex.org\/keywords\/secure-transmission","display_name":"Secure transmission","score":0.5307244062423706},{"id":"https:\/\/openalex.org\/keywords\/node","display_name":"Node (physics)","score":0.523999810218811},{"id":"https:\/\/openalex.org\/keywords\/secrecy","display_name":"Secrecy","score":0.48858246207237244},{"id":"https:\/\/openalex.org\/keywords\/channel","display_name":"Channel (broadcasting)","score":0.4567597508430481},{"id":"https:\/\/openalex.org\/keywords\/linear-network-coding","display_name":"Linear network coding","score":0.4480677545070648},{"id":"https:\/\/openalex.org\/keywords\/physical-layer","display_name":"Physical layer","score":0.4394950270652771},{"id":"https:\/\/openalex.org\/keywords\/signal-to-noise-ratio","display_name":"Signal-to-noise ratio (imaging)","score":0.37620609998703003},{"id":"https:\/\/openalex.org\/keywords\/wireless","display_name":"Wireless","score":0.31866446137428284},{"id":"https:\/\/openalex.org\/keywords\/telecommunications","display_name":"Telecommunications","score":0.27356433868408203},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.18399590253829956},{"id":"https:\/\/openalex.org\/keywords\/engineering","display_name":"Engineering","score":0.109855055809021},{"id":"https:\/\/openalex.org\/keywords\/encryption","display_name":"Encryption","score":0.10093405842781067},{"id":"https:\/\/openalex.org\/keywords\/network-packet","display_name":"Network packet","score":0.06503048539161682}],"concepts":[{"id":"https:\/\/openalex.org\/C2776788033","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q320769","display_name":"Eavesdropping","level":2,"score":0.8632322549819946},{"id":"https:\/\/openalex.org\/C2777679929","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7883709","display_name":"Underlay","level":3,"score":0.8357134461402893},{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.7607035636901855},{"id":"https:\/\/openalex.org\/C31258907","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1301371","display_name":"Computer network","level":1,"score":0.7564735412597656},{"id":"https:\/\/openalex.org\/C2778156585","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q174053","display_name":"Relay","level":3,"score":0.6787729263305664},{"id":"https:\/\/openalex.org\/C148063708","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q5072511","display_name":"Channel state information","level":3,"score":0.5905479192733765},{"id":"https:\/\/openalex.org\/C761482","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.574312686920166},{"id":"https:\/\/openalex.org\/C2779814227","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7444882","display_name":"Secure transmission","level":3,"score":0.5307244062423706},{"id":"https:\/\/openalex.org\/C62611344","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1062658","display_name":"Node (physics)","level":2,"score":0.523999810218811},{"id":"https:\/\/openalex.org\/C2776452267","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1503443","display_name":"Secrecy","level":2,"score":0.48858246207237244},{"id":"https:\/\/openalex.org\/C127162648","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4567597508430481},{"id":"https:\/\/openalex.org\/C138293262","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1089578","display_name":"Linear network coding","level":3,"score":0.4480677545070648},{"id":"https:\/\/openalex.org\/C19247436","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q192727","display_name":"Physical layer","level":3,"score":0.4394950270652771},{"id":"https:\/\/openalex.org\/C13944312","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.37620609998703003},{"id":"https:\/\/openalex.org\/C555944384","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q249","display_name":"Wireless","level":2,"score":0.31866446137428284},{"id":"https:\/\/openalex.org\/C76155785","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q418","display_name":"Telecommunications","level":1,"score":0.27356433868408203},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.18399590253829956},{"id":"https:\/\/openalex.org\/C127413603","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11023","display_name":"Engineering","level":0,"score":0.109855055809021},{"id":"https:\/\/openalex.org\/C148730421","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q141090","display_name":"Encryption","level":2,"score":0.10093405842781067},{"id":"https:\/\/openalex.org\/C158379750","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q214111","display_name":"Network packet","level":2,"score":0.06503048539161682},{"id":"https:\/\/openalex.org\/C121332964","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q413","display_name":"Physics","level":0,"score":0},{"id":"https:\/\/openalex.org\/C163258240","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q25342","display_name":"Power (physics)","level":2,"score":0},{"id":"https:\/\/openalex.org\/C66938386","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q633538","display_name":"Structural engineering","level":1,"score":0},{"id":"https:\/\/openalex.org\/C62520636","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q944","display_name":"Quantum mechanics","level":1,"score":0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109\/lwc.2020.2986404","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1109\/lwc.2020.2986404","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https:\/\/openalex.org\/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https:\/\/openalex.org\/W1667165204","https:\/\/openalex.org\/W1778513012","https:\/\/openalex.org\/W2120658941","https:\/\/openalex.org\/W2133072340","https:\/\/openalex.org\/W2170561782","https:\/\/openalex.org\/W2526742096","https:\/\/openalex.org\/W2752221828","https:\/\/openalex.org\/W2797864638","https:\/\/openalex.org\/W2801805628","https:\/\/openalex.org\/W2891685769","https:\/\/openalex.org\/W2903449856","https:\/\/openalex.org\/W2942228371","https:\/\/openalex.org\/W2962779488","https:\/\/openalex.org\/W3113221786"],"related_works":["https:\/\/openalex.org\/W3026705917","https:\/\/openalex.org\/W2516026999","https:\/\/openalex.org\/W3166880716","https:\/\/openalex.org\/W2155410265","https:\/\/openalex.org\/W3121990887","https:\/\/openalex.org\/W2959329152","https:\/\/openalex.org\/W2769689807","https:\/\/openalex.org\/W1733425272","https:\/\/openalex.org\/W1540514160","https:\/\/openalex.org\/W2904430835"],"abstract_inverted_index":{"This":[0],"letter":[1],"examines":[2],"the":[3,19,22,46,53,66,72,77,84],"physical":[4],"layer":[5],"security":[6],"of":[7],"a":[8,34,41],"cellular":[9,47],"network":[10,48],"with":[11],"inband":[12],"underlay":[13],"relay-aided":[14],"Device-to-Device":[15],"(D2D)":[16],"communication,":[17],"considering":[18],"scenario":[20],"where":[21],"channel":[23],"state":[24],"information":[25],"is":[26],"outdated.":[27],"The":[28],"relay":[29],"node,":[30],"which":[31],"operates":[32],"in":[33],"full-duplex":[35],"mode,":[36],"can":[37],"concurrently":[38],"serve":[39],"as":[40],"friendly":[42],"jammer":[43],"to":[44,64],"enhance":[45],"secrecy":[49,78],"performance":[50],"while":[51],"increasing":[52],"D2D":[54,73],"communication":[55],"data":[56],"transmission.":[57],"A":[58],"passive":[59],"eavesdropper":[60],"utilizes":[61],"combining":[62],"approaches":[63],"combine":[65],"eavesdropping":[67],"signals.":[68],"Closed-form":[69],"expressions":[70],"for":[71],"outage":[74,79],"probability":[75,80],"and":[76],"are":[81,87],"derived.":[82],"Furthermore,":[83],"asymptotic":[85],"results":[86],"also":[88],"provided.":[89]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":5}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}