{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:58:30Z","timestamp":1768409910215,"version":"3.49.0"},"reference-count":26,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2012,11,7]],"date-time":"2012-11-07T00:00:00Z","timestamp":1352246400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Trans. Emerging Tel. Tech."],"published-print":{"date-parts":[[2014,4]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>Physical layer security has recently attracted considerable attention in the context of information\u2010theoretic point of view. In this paper, we investigate relay selection schemes for security\u2010constrained half\u2010duplex cooperative wireless networks with multiple eavesdroppers, which have the ability to cooperate to overhear the source transmission. The proposed techniques select a trusted decode\u2010and\u2010forward relay to assist the source transmission and maximize the achievable secure rate for different eavesdropper policies (cooperation or not); for the two cases, we assume that the channel is always available. In addition, a jamming method that selects two relay nodes to create an intentional interference at both phases of the decode\u2010and\u2010forward protocol to confound the eavesdropper nodes is also considered. Both the source\u2013destination and source\u2013eavesdroppers links are taken into account in the proposed analysis. Secrecy rate and secrecy outage probability are the two performance metrics that are used to verify the effectiveness of the proposed schemes while asymptotic approximations of the secrecy outage probability are also derived. Simulation and analytical results demonstrate the performance improvement of the proposed schemes. Copyright \u00a9 2012 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/ett.2581","type":"journal-article","created":{"date-parts":[[2012,11,7]],"date-time":"2012-11-07T23:56:09Z","timestamp":1352332569000},"page":"445-460","source":"Crossref","is-referenced-by-count":17,"title":["Relaying techniques for enhancing the physical layer\u2009secrecy in cooperative networks with multiple\u2009eavesdroppers"],"prefix":"10.1002","volume":"25","author":[{"given":"Azzam Y.","family":"Al\u2010nahari","sequence":"first","affiliation":[{"name":"Department of Electronics Engineering, Faculty of Engineering and Architecture Ibb University Ibb Yemen"}]},{"given":"Ioannis","family":"Krikidis","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering University of Cyprus 1678 Nicosia Cyprus"}]},{"given":"Ahmed S.","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Department of Electrical Communications, Faculty of Engineering Cairo University Egypt"}]},{"given":"Moawad I.","family":"Dessouky","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Communications, Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt"}]},{"given":"Fathi E.","family":"Abd El\u2010Samie","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Communications, Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt"}]}],"member":"311","published-online":{"date-parts":[[2012,11,7]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1593277"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"e_1_2_10_5_1","doi-asserted-by":"crossref","unstructured":"LiangY PoorHV YingL.Wireless broadcast networks: reliability security and stability InIEEE Information Theory Workshop San Diego CA Feb.2008;249\u2013255.","DOI":"10.1109\/ITA.2008.4601057"},{"key":"e_1_2_10_6_1","doi-asserted-by":"crossref","unstructured":"BarrosJ RodriguesMRD.Secrecy capacity of wireless channels InIEEE International Symposium on Information Theory (ISIT) Seattle USA July2006;356\u2013360.","DOI":"10.1109\/ISIT.2006.261613"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.820010"},{"key":"e_1_2_10_8_1","doi-asserted-by":"crossref","unstructured":"OggierF HassibiB.The secrecy capacity of the MIMO wiretap channel InIEEE International Symposium on Information Theory (ISIT) Toronto ON Canada Jul.2008;524\u2010528.","DOI":"10.1109\/ISIT.2008.4595041"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2048445"},{"key":"e_1_2_10_10_1","doi-asserted-by":"crossref","unstructured":"LiZ TrappeW YatesR.Secret communication via multi\u2010antenna transmission InProceedings of the 41st Annual Conference on Information Sciences and Systems Baltimore MD Mar.2007;905\u2013910.","DOI":"10.1109\/CISS.2007.4298439"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2003.818096"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838089"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2020776"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"e_1_2_10_15_1","article-title":"Optimal cooperative relaying schemes for improving wireless physical layer security","author":"Li J","journal-title":"IEEE Transactions on Signal Processing"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928272"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2009.0634"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.090323"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060184"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070176"},{"key":"e_1_2_10_21_1","doi-asserted-by":"crossref","unstructured":"J\u00f8rgensenML YanakievB KirkelundGE PopovskiP YomoH LarsenT.Shout to secure: Physical\u2010layer wireless secrecy with known interference InProceedings of IEEE Globecom Nov.2007.","DOI":"10.1109\/GLOCOM.2007.14"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"e_1_2_10_23_1","doi-asserted-by":"crossref","unstructured":"WangP YuG ZhangZ.On the secrecy capacity of fading wireless channel with multiple eavesdroppers InIEEE International Symposium on Information Theory (ISIT) Nice France Jun.2007.","DOI":"10.1109\/ISIT.2007.4557128"},{"key":"e_1_2_10_24_1","volume-title":"Probability, Random Variables, and Stochastic Processes","author":"Papoulis A","year":"1991"},{"key":"e_1_2_10_25_1","volume-title":"The Asymptotic Theory of Extreme Order Statistics","author":"Galambos J","year":"1987"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471722162"},{"key":"e_1_2_10_27_1","volume-title":"Tables of Integrals, Series, and Products","author":"Gradshteyn IS","year":"2007"}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fett.2581","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.2581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,20]],"date-time":"2025-04-20T12:04:58Z","timestamp":1745150698000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.2581"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,7]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["10.1002\/ett.2581"],"URL":"https:\/\/doi.org\/10.1002\/ett.2581","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"value":"2161-3915","type":"print"},{"value":"2161-3915","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,7]]}}}