{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T17:24:36Z","timestamp":1707845076502},"reference-count":38,"publisher":"Wiley","issue":"12","license":[{"start":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T00:00:00Z","timestamp":1540857600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[2018,12]]},"abstract":"Abstract<\/jats:title>In this paper, we address the physical layer security of a cooperative vehicular network in the presence of a passive eavesdropper vehicle, where the communication from a fixed source node to a fixed destination node is assisted by an amplify\u2010and\u2010forward relay vehicle and by direct link, in two transmission phases. Based on the security of the first transmission phase, we consider two scenarios for the cooperative vehicular networks. In Scenario I<\/jats:bold>, the first phase is secure (ie, the direct link between source and eavesdropper is not available) and the eavesdropping occurs only in the second phase. In Scenario II<\/jats:bold>, the first phase is not secure (ie, the direct link between source and eavesdropper is present) and the eavesdropping occurs during both the first and second phases. We assume that source\u2010to\u2010destination, source\u2010to\u2010relay vehicle, relay vehicle\u2010to\u2010destination, and source\u2010to\u2010eavesdropper vehicle channels are modeled as Rayleigh fading, whereas the channel between relay and eavesdropper vehicles is modeled by double\u2010Rayleigh fading. Under such channel modeling, we deduce the new tight closed\u2010form expressions for the secrecy outage probability (SOP) under both Scenario I<\/jats:bold> and Scenario II<\/jats:bold>. We also investigate the effective secrecy diversity order in the high main\u2010to\u2010eavesdropper ratio (MER) regime. The numerical and simulation results corroborate our theoretical analysis and findings and show the occurrence condition for SOP floor phenomenon and influences of channel conditions and relay and eavesdropper locations on the SOP performance. Our results also reveal that the presence of source\u2010to\u2010eavesdropper link has significant impact on the SOP performance and relay location.<\/jats:p>","DOI":"10.1002\/ett.3534","type":"journal-article","created":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T03:05:23Z","timestamp":1540955123000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Performance evaluation of amplify\u2010and\u2010forward relaying cooperative vehicular networks under physical layer security"],"prefix":"10.1002","volume":"29","author":[{"given":"Anshul","family":"Pandey","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering Indian Institute of Information Technology Allahabad Allahabad India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8734-3791","authenticated-orcid":false,"given":"Suneel","family":"Yadav","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering Indian Institute of Information Technology Allahabad Allahabad India"}]}],"member":"311","published-online":{"date-parts":[[2018,10,30]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4539481"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2010.938166"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-085-4"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2439292"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2665968"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2459592"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131011"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2617328"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2486768"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2016.2597278"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2530068"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2385095"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2584006"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2014.031114.140018"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-epa.2016.0678"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2712601"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2831217"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2010.2102017"},{"key":"e_1_2_7_22_1","doi-asserted-by":"crossref","unstructured":"IlhanH AkinAI.Performance analysis of AF relaying cooperative systems with relay selection over double Rayleigh fading channels. Paper presented at: 6th International Conference on Signal Processing and Communication Systems (ICSPCS);2012;Gold Coast Australia.","DOI":"10.1109\/ICSPCS.2012.6508001"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2015.2505308"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2766267"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2014685"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-3047-1"},{"key":"e_1_2_7_27_1","unstructured":"AndersenJB.Statistical distributions in mobile communications using multiple scattering. Paper presented at: 27th General Assembly of the International Union of Radio Science (URSI);2002;Maastricht The Netherlands."},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2006.883964"},{"key":"e_1_2_7_29_1","unstructured":"KovacsIZ EggersPCF OlesenK PetersenLG.Investigations of outdoor\u2010to\u2010indoor mobile\u2010to\u2010mobile radio communication channels. Paper presented at: IEEE Vehicular Technology Conference (VTC\u2010Fall);2002;Vancouver Canada."},{"key":"e_1_2_7_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.05913"},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2014-109"},{"key":"e_1_2_7_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2016.10.014"},{"key":"e_1_2_7_33_1","volume-title":"Tables of Integrals, Series, and Products","author":"Gradshteyn IS","year":"2000"},{"key":"e_1_2_7_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2345763"},{"key":"e_1_2_7_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2329853"},{"key":"e_1_2_7_36_1","volume-title":"Integrals and Series Volume 2: Special Functions","author":"Prudnikov AP","year":"1992"},{"key":"e_1_2_7_37_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781584889571"},{"key":"e_1_2_7_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2786471"},{"key":"e_1_2_7_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2399295"}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fett.3534","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.3534","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/ett.3534","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.3534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T19:12:32Z","timestamp":1694805152000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.3534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,30]]},"references-count":38,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["10.1002\/ett.3534"],"URL":"https:\/\/doi.org\/10.1002\/ett.3534","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"value":"2161-3915","type":"print"},{"value":"2161-3915","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,30]]},"assertion":[{"value":"2018-06-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-10-02","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}