Results 141 to 150 of about 3,650 (187)

Joint power allocation and relay selection scheme in untrusted UAV relays system

2021 IEEE 5th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC), 2021
In order to solve the security problem in the downlink untrusted UAV multi-relay system, a joint power allocation and relay selection scheme with hardware impairment is proposed. In this scheme, cooperative jamming technology is applied to the untrusted UAV relay system. Firstly, the power allocation coefficient of artificial noise used for cooperative
Yue Li, Chen Jing, Yimeng Zhao
openaire   +1 more source

Counterfactual quantum cryptography network with untrusted relay

International Journal of Modern Physics B, 2015
Counterfactual quantum cryptography allows two remote parties to share a secret key even though a physical particle is not in fact transmitted through the quantum channel. In order to extend the scope of counterfactual quantum cryptography, we use an untrusted relay to construct a multi-user network. The implementation issues are discussed to show that
Chen, Yuanyuan   +4 more
openaire   +2 more sources

Performance of Untrusted Amplify-and-Forward Relaying

2013 4th International Conference on Intelligent Systems, Modelling and Simulation, 2013
In this paper, we analyze the secrecy outage performance of amplify-and-forward (AF)-based relay networks consisting of a source, a destination, and an untrusted relay, where each terminal has a single antenna and operates in a half-duplex mode. In this network, the common message is transmitted through the relay-path, and the private message is ...
null MinChul Ju, null Do-Hoon Kim
openaire   +1 more source

Multi-terminal networks with an untrusted relay

2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2014
This paper investigates the impact of cooperation with an untrusted relay in multi-source multi-destination networks. The set up considered is one where the relay is the only means of communications due to the absence of direct links between the sources and the destinations.
Ahmed A. Zewail   +2 more
openaire   +1 more source

Cooperative non-orthogonal relaying for security enhancement in untrusted relay networks

2017 IEEE International Conference on Communications (ICC), 2017
Recently, there has been a surge of increased interest in using physical layer security to safeguard the fifth generation (5G) mobile networks. In this paper, we study the problem of secure communications in untrusted relay networks. A new nonorthogonal relaying protocol is proposed, aiming at maximizing the secrecy rate.
Lu Lv, Qiang Ni, Zhiguo Ding, Jian Chen
openaire   +1 more source

Relay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes

IEEE Transactions on Information Forensics and Security, 2016
In this paper, the security aspect of an amplify-and-forward relaying network with untrusted relay nodes is considered. The untrusted nodes can help to forward the received signal and they may also try to decode such information, which can be regarded as potential eavesdroppers (Eves). To deal with such a challenging issue, a successive relaying scheme
Wei Wang, Kah Chan Teh, Kwok Hung Li
openaire   +1 more source

Physical-layer secret key generation with untrusted relays

2014 IEEE Globecom Workshops (GC Wkshps), 2014
In this paper, we propose a physical-layer secret key generation scheme for multi-antenna legitimate nodes with the help from multiple untrusted relays with single antenna. The relays' actions conform to the rules but they passively eavesdrop the information.
Chan Dai Truyen Thai   +3 more
openaire   +1 more source

Opportunistic Transmission of Nonregenerative Network With Untrusted Relay

IEEE Transactions on Vehicular Technology, 2015
In this paper, we consider an opportunistic transmission scheme of nonregenerative relay networks consisting of a source, a destination, and an untrusted relay, where the relay has a different security clearance from the source–destination pair. In this network, the information is transmitted through the direct link if the secrecy rate of the direct ...
MinChul Ju, Do-Hoon Kim, Kyu-Sung Hwang
openaire   +1 more source

Leaking Rate Region to Eavesdroppers and Untrusted Relays

2016 IEEE Global Communications Conference (GLOBECOM), 2016
The trustworthiness of nodes in a network is practically a complicated concept and strongly depends on the social relationship among the nodes. For a certain model of trustworthiness, the scheme can be optimized to achieve the highest average secrecy rate based on pre-defined information about possibly malicious nodes.
Chan Dai Truyen Thai   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy