<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.518904</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Electrical Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Elektrik Mühendisliği</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Secrecy Analysis of Multi-user Half/Full-Duplex Wireless Bi-directional Relaying Network</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-9442-9099</contrib-id>
                                                                <name>
                                    <surname>Ozduran</surname>
                                    <given-names>Volkan</given-names>
                                </name>
                                                                    <aff>İSTANBUL ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20190730">
                    <day>07</day>
                    <month>30</month>
                    <year>2019</year>
                </pub-date>
                                        <volume>7</volume>
                                        <issue>3</issue>
                                        <fpage>342</fpage>
                                        <lpage>354</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20190128">
                        <day>01</day>
                        <month>28</month>
                        <year>2019</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20190702">
                        <day>07</day>
                        <month>02</month>
                        <year>2019</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>This paper investigates the physical layer security of orthogonal frequency division multiplexing technique. The investigation considers a multi-user untrustworthy half/full-duplex based two-way wireless relay with a finite number of friendly jammers in the system model. According to Monte-Carlo simulation results, the system model that operates in full-duplex mode achieves slightly better secrecy outage performance than the system model that operates in half-duplex mode. The results also show that friendly jammers, besides minimizing the information leakage, degrade the system performance severely and cause system coding gain losses in high signal-to-noise ratios.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Physical Layer Security</kwd>
                                                    <kwd>  OFDM</kwd>
                                                    <kwd>  Two-Way Relay</kwd>
                                                    <kwd>  Half/Full-Duplex Relay</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">J. Daemen and V. Rijmen, “AES proposal: Rijndael,” 1999.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. of the ACM, vol. 21, pp. 120–126, 1978.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">A. D.Wyner, “The wire-tap channel,” Bell. Syst. Tech. J., vol. 54, no. 8, p. 13551387, 1975.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">C. Cai, Y. Cai, R. Wang, W. Yang, and W. Yang, “Resource allocation for physical layer security in cooperative OFDM networks,” in 2015 Intern. Conf. on Wireless Commun. Signal Processing (WCSP), Oct 2015, pp. 1–5.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">C. Jeong and I. M. Kim, “Optimal power allocation for secure multicarrier relay systems,” IEEE Trans. on Signal Process., vol. 59, no. 11, pp. 5428–5442, Nov 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">H. Zhang, H. Xing, J. Cheng, A. Nallanathan, and V. C. M. Leung, “Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming,” IEEE Trans. on Indust. Informatics, vol. 12, no. 5, pp. 1714–1725, Oct 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">D. W. K. Ng, E. S. Lo, and R. Schober, “Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks,” IEEE Trans. on Wireless Commun., vol. 10, no. 10, pp. 3528–3540, October 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">W. Aman, G. A. S. Sidhu, T. Jabeen, F. Gao, and S. Jin, “Enhancing physical layer security in dual-hop multiuser transmission,” in 2016 IEEE Wireless Commun. and Networking Conf., April 2016, pp. 1–6.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">C. Cai, Y. Cai, and W. Yang, “Secrecy rates for relay selection in OFDMA networks,” in 2011 Third Intern. Conf. on Commun. and Mobile Comp., April 2011, pp. 158–160.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">V. Ozduran, “Physical layer security of multi-user full-duplex one-way wireless relaying network,” in Advances in Wireless and Optical Communications (RTUWO’18), Riga, Latvia, 15- 16 November 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">E. Soleimani-Nasab, M. Matthaiou, M. Ardebilipour, and G. K. Karagiannidis, “Two-way AF relaying in the presence of co-channel interference,” IEEE Trans. on Commun., vol. 61, no. 8, pp. 3156–3169, August 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">V. Ozduran, E. Soleimani-Nasab, and B. S. Yarman, “Opportunistic source-pair selection for multi-user two-way amplify-and-forward wireless relaying networks,” IET Commun., vol. 10, no. 16, pp. 2106–2118, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">A. Papoulis and U. Pillai, Probability, random variables and stochastic processes, 4th ed. McGraw-Hill, 11 2001.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">I. S. Gradshteyn and I. M. Ryzhik, Tables of Integrals, Series and Products. Elsevier Inc., 7th edition, 2007.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">V. S. Adamchik and O. I. Marichev, The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE systems. Proc. Conf. ISSAC’90, Tokyo, pp. 212224, 1990.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">N. H. Mahmood, I. S. Ansari, P. Popovski, P. Mogensen, and K. A. Qaraqe, “Physical-layer security with full-duplex transceivers and multiuser receiver at eve,” IEEE Trans. on Commun., vol. 65, no. 10, pp. 4392–4405, Oct 2017.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
