Results 1 to 10 of about 3,650 (187)

Joint Resource Allocation in Secure OFDM Two-Way Untrusted Relay System [PDF]

open access: yesSensors, 2022
The security issue of wireless communication is a common concern because of its broadcast nature, especially when the relay becomes an eavesdropper. In the orthogonal frequency division multiplexing (OFDM) relay system, when the relay is untrusted, the ...
Yifeng Jin   +4 more
doaj   +2 more sources

Cooperation with an Untrusted Relay: A Secrecy Perspective [PDF]

open access: yesIEEE Transactions on Information Theory, 2009
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help.
He, Xiang, Yener, Aylin
core   +3 more sources

Secure Transmission for Simultaneous Wireless Information and Power Transfer in AF Untrusted Relay Networks [PDF]

open access: yesSensors, 2018
This paper investigates secure communications of energy harvesting untrusted relay networks, where the destination assists jamming signal to prevent the untrusted relay from eavesdropping and to improve the forwarding ability of the energy constrained ...
Hui Shi   +4 more
doaj   +2 more sources

Two-Hop Secure Communication Using an Untrusted Relay

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the ...
Xiang He, Aylin Yener
doaj   +4 more sources

On Security Performance of SWIPT Multi-User Jamming Based on Mixed RF/FSO Systems with Untrusted Relay [PDF]

open access: yesSensors
This paper presents research on the security performance of a multi-user interference-based mixed RF/FSO system based on SWIPT untrusted relay. In this work, the RF and FSO channels experience Nakagami-m fading distribution and Málaga (M) turbulence ...
Xingyue Guo   +3 more
doaj   +2 more sources

Secure Physical Layer Network Coding versus Secure Network Coding [PDF]

open access: yesEntropy, 2021
When a network has relay nodes, there is a risk that a part of the information is leaked to an untrusted relay. Secure network coding (secure NC) is known as a method to resolve this problem, which enables the secrecy of the message when the message is ...
Masahito Hayashi
doaj   +2 more sources

Physical layer security: friendly Jamming in an untrusted relay scenario [PDF]

open access: yes2016 24th European Signal Processing Conference (EUSIPCO), 2016
This paper investigates the achievable secrecy regions when employing a friendly jammer in a cooperative scenario employing an untrusted relay. The untrusted relay which helps to forward the source signal towards the destination, could also be regarded ...
Bakhtiar Ali   +4 more
core   +3 more sources

Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay [PDF]

open access: yesIEEE Transactions on Signal Processing, 2013
This paper studies the secure beamforming design in a multiple-antenna three-node system where two source nodes exchange messages with the help of an untrusted relay node. The relay acts as both an essential signal forwarder and a potential eavesdropper.
Jianhua Mo   +5 more
core   +2 more sources

Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution

open access: yesEntropy, 2015
We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an
Yichen Zhang   +6 more
doaj   +4 more sources

Physical Layer Security in Cognitive Untrusted Relay Networks

open access: yesIEEE Access, 2018
In this paper, we consider the secure communications in a cognitive untrusted relay network, where the secondary source intends to communicate with a secondary destination through an untrusted relay in the presence of the direct source-destination link ...
Dechuan Chen   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy