Skip navigation
Skip navigation

On cooperative and malicious behaviors in multirelay fading channels

Chen, Meng-Hsi; Lin, Shih-Chun; Hong, Y.-W. Peter; Zhou, Xiangyun

Description

Multirelay networks exploit spatial diversity by transmitting user's messages through multiple relay paths. Most works in the literature on cooperative or relay networks assume that all terminals are fully cooperative and neglect the effect of possibly ex

dc.contributor.authorChen, Meng-Hsi
dc.contributor.authorLin, Shih-Chun
dc.contributor.authorHong, Y.-W. Peter
dc.contributor.authorZhou, Xiangyun
dc.date.accessioned2015-12-13T22:24:52Z
dc.date.created2013
dc.identifier.issn1556-6021
dc.identifier.urihttp://hdl.handle.net/1885/72953
dc.description.abstractMultirelay networks exploit spatial diversity by transmitting user's messages through multiple relay paths. Most works in the literature on cooperative or relay networks assume that all terminals are fully cooperative and neglect the effect of possibly ex
dc.format.mimetypeapplication/pdf
dc.language.isoen_AU
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.sourceIEEE Transactions on Information Forensics and Security
dc.subjectKeywords: CSI; Malicious behavior; malicious relay; Mutual information game; Mutual informations; Optimal attack strategies; Optimal transmission strategy; Transmission phase; Cooperative communication; Fading channels; Game theory; Information theory; Jamming; Opt Cooperative communications; CSI; game theory; jamming; malicious relay; mutual information
dc.titleOn cooperative and malicious behaviors in multirelay fading channels
dc.typeJournal article
local.description.notesImported from ARIES
local.identifier.citationvolume8
local.identifier.absfor100503 - Computer Communications Networks
local.identifier.ariespublicationf5625xPUB3499
local.type.statusPublished Version
local.contributor.affiliationChen, Meng-Hsi, National Tsing-Hua University
local.contributor.affiliationLin, Shih-Chun, National Taiwan University of Science and Technology
local.contributor.affiliationHong, Y.-W. Peter, National Tsing Hua University
local.contributor.affiliationZhou, Xiangyun (Sean), College of Engineering and Computer Science, ANU
local.description.embargo2037-12-31
local.bibliographicCitation.issue7
local.bibliographicCitation.startpage1126
local.bibliographicCitation.lastpage1139
local.identifier.doi10.1109/TIFS.2013.2262941
dc.date.updated2016-02-24T09:12:32Z
local.identifier.scopusID2-s2.0-84878833098
local.identifier.thomsonID000320866600005
CollectionsANU Research Publications

Download

File Description SizeFormat Image
01_Chen_On_cooperative_and_malicious_2013.pdf3.94 MBAdobe PDF    Request a copy


Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  19 May 2020/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator