Skip to main content

Table 1 Scenarios considered in the numerical results.

From: Two-Hop Secure Communication Using an Untrusted Relay

 

Relay's power

Jammer's power

Figure 6

Proportional

Optimal

Figure 7

Fixed

Optimal

Figure 8

Limited

Proportional

Figure 9

Limited

Fixed

Figure 10

Limited

Proportional

Optimal

Figure 11

Limited

Fixed

Optimal