We know that the eavesdroppers are malicious nodes and they are not supposed to cooperate with the users. If we exploit opportunistic relaying protocol for the destination, can we consider the same protocol for the eavesdropper? If so, then how the CSI of the eavesdropper can be estimated at the relay?

More A. S. M. Badrudduza's questions See All
Similar questions and discussions