Results 91 to 100 of about 3,690 (182)

Secure physical layer network coding versus secure network coding

open access: yes, 2018
Secure network coding realizes the secrecy of the message when the message is transmitted via noiseless network and a part of edges or a part of intermediate nodes are eavesdropped.
Hayashi, Masahito
core  

Secrecy Rate-Optimum Energy Splitting for an Untrusted and Energy Harvesting Relay Network

open access: yesIEEE Access, 2018
In this paper, a destination-assisted-jamming-based secure transmission is devised for an untrusted and energy harvesting relay network. In the proposed scheme, both source and destination split their energies into two parts for energy harvesting at the ...
Rugui Yao   +5 more
doaj   +1 more source

Cooperative jamming for energy harvesting multicast networks with an untrusted relay

open access: yesIET Communications, 2017
Recently, there are increasing requirements of security in wireless communications, especially for the multiuser systems. In this study, the authors consider the security of two‐hop cooperative multicast networks with an untrusted relay. An energy harvesting destination aided cooperative jamming framework is proposed to protect information from being ...
Bingtao He   +3 more
openaire   +1 more source

Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network

open access: yesInternational Journal of Antennas and Propagation, 2015
The secure communication that multiple OFDMA-based cell-edge mobile stations (MS) can only transmit confidential messages to base station (BS) through an untrusted intermediate relay (UR) is discussed.
Weiheng Jiang, Wenjiang Feng
doaj   +1 more source

Joint power control for untrusted relay cooperation-based confidential communication

open access: yesTongxin xuebao, 2014
The scenario that multiple cell-edge mobile stations (MS) all without direct-links to the base station (BS) but have confidential messages in the uplink in the presence of untrusted relay (UR) cooperation was considered.In order to implement the secure ...
Wen-jiang FENG   +3 more
doaj   +2 more sources

Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination

open access: yesTongxin xuebao, 2018
The cooperative relay technique in the field of physical layer security is widely concerned by the academic community,due to the advantages of increasing the network capacity and expanding the network coverage.However,cooperative relays may play as ...
Rui ZHAO   +4 more
doaj   +2 more sources

Secure transmission in backhaul NOMA systems: A physical layer security design with untrusted user and eavesdropper

open access: yesDigital Communications and Networks
In order to improve the Physical Layer Security (PLS) perspective, this paper aims to empower function of PLS by considering a backhaul Non-Orthogonal Multiple Access (NOMA) system in two practical situations.
Chi-Bao Le   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy