{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:13:59Z","timestamp":1726031639409},"reference-count":43,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Communications"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1049\/iet-com.2019.0584","type":"journal-article","created":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T02:15:21Z","timestamp":1570846521000},"page":"95-104","source":"Crossref","is-referenced-by-count":36,"title":["Physical layer security in cooperative amplify\u2010and\u2010forward relay networks over mixed Nakagami\u2010\n m<\/i>\n and double Nakagami\u2010\n m<\/i>\n fading channels: performance evaluation and optimisation"],"prefix":"10.1049","volume":"14","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7911-3451","authenticated-orcid":false,"given":"Anshul","family":"Pandey","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication EngineeringIndian Institute of Information Technology AllahabadPrayagraj211015Uttar PradeshIndia"}]},{"given":"Suneel","family":"Yadav","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication EngineeringIndian Institute of Information Technology AllahabadPrayagraj211015Uttar PradeshIndia"}]}],"member":"265","published-online":{"date-parts":[[2020,1]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2795381"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2010.938166"},{"issue":"5","key":"e_1_2_8_4_1","first-page":"156","article-title":"Wireless communication technologies for ITS applications","volume":"48","author":"Dar K.","year":"2010","journal-title":"IEEE Intell. Transp. Syst. Mag."},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131011"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2617328"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2345763"},{"issue":"5","key":"e_1_2_8_11_1","first-page":"4098","article-title":"Sum secrecy rate maximization for relay\u2010aided multiple\u2010source multiple\u2010destination networks","volume":"66","author":"Zhang M.","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2486768"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0355"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2756885"},{"issue":"6","key":"e_1_2_8_15_1","doi-asserted-by":"crossref","first-page":"3822","DOI":"10.1109\/TWC.2018.2816648","article-title":"Average secrecy outage rate and average secrecy outage duration of wireless communication systems with diversity over Nakagami\u2010m fading channels","volume":"17","author":"Omri A.","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"15","key":"e_1_2_8_16_1","doi-asserted-by":"crossref","first-page":"8009","DOI":"10.1109\/TWC.2016.2610965","article-title":"Secure multiuser scheduling in downlink dual\u2010hop regenerative relay networks over Nakagami\u2010m fading channels","volume":"12","author":"Yang M.","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"e_1_2_8_17_1","unstructured":"AndersenJ.B.: \u2018Statistical distributions in mobile communications using multiple scattering\u2019. Proc. 27th URSI General Assembly Maastricht The Netherlands 2002"},{"issue":"8","key":"e_1_2_8_18_1","doi-asserted-by":"crossref","first-page":"1453","DOI":"10.1109\/TCOMM.2007.902497","article-title":"N*Nakagami: a novel stochastic model for cascaded fading channels","volume":"55","author":"Karagianndis G.K.","year":"2007","journal-title":"IEEE Trans. Commun."},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2010.2102017"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2766267"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-3047-1"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2014685"},{"issue":"4","key":"e_1_2_8_23_1","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1016\/j.aeue.2016.01.003","article-title":"Fixed\u2010gain AF PLNC over cascaded Nakagami\u2010m fading channels for vehicular communications","volume":"70","author":"Ata S.O.","year":"2016","journal-title":"AEU Int. J. Electron. Commun."},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2018.04.019"},{"key":"e_1_2_8_25_1","first-page":"1","article-title":"Physical layer security performance of mobile vehicular networks","author":"Xu L.","year":"2019","journal-title":"Mobile Netw. Appl."},{"key":"e_1_2_8_26_1","first-page":"1","article-title":"Distributed source\u2010relay selection scheme for vehicular relaying networks under eavesdropping attacks","volume":"109","author":"Sun L.","year":"2014","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.01.001"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2016.10.014"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3534"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2866590"},{"key":"e_1_2_8_31_1","doi-asserted-by":"crossref","unstructured":"IkkiS.S. UysalM. AhmedM.H.: \u2018Joint optimization of power allocation and relay location for decode\u2010and\u2010forward dual\u2010hop systems over Nakagami\u2010m fading channels\u2019. Global Telecommunications Conf. (GLOBECOM) Honolulu USA 2009 pp.1\u20136","DOI":"10.1109\/GLOCOM.2009.5425903"},{"key":"e_1_2_8_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.092911.111685"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.052512.120002"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2014.1248"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2014.031114.140018"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2822286"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2017.0147"},{"issue":"2","key":"e_1_2_8_38_1","first-page":"341","article-title":"Joint relay selection and power allocation in large\u2010scale MIMO systems with untrusted relays and passive eavesdroppers","volume":"13","author":"Kuhestani A.","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"e_1_2_8_39_1","volume-title":"Tables of integrals, series, and products","author":"Gradshteyn I.S.","year":"2000"},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854233"},{"key":"e_1_2_8_41_1","unstructured":"The Wolfram Functions Site [Online]. Available athttp:\/\/functions.wolfram.com\/"},{"key":"e_1_2_8_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2786471"},{"key":"e_1_2_8_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2615261"},{"key":"e_1_2_8_44_1","first-page":"1","article-title":"Secure communications over cell\u2010free massive MIMO networks with hardware impairments","author":"Zhang X.","year":"2019","journal-title":"IEEE Syst. J."}],"container-title":["IET Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-com.2019.0584","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-com.2019.0584","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-com.2019.0584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T09:40:24Z","timestamp":1610617224000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-com.2019.0584"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["10.1049\/iet-com.2019.0584"],"URL":"https:\/\/doi.org\/10.1049\/iet-com.2019.0584","archive":["Portico"],"relation":{},"ISSN":["1751-8636","1751-8636"],"issn-type":[{"value":"1751-8636","type":"print"},{"value":"1751-8636","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1]]}}}