A comprehensive survey on securing the social internet of things: protocols, threat mitigation, technological integrations, tools, and performance metrics. [PDF]
Patil DA, G S.
europepmc +1 more source
Related searches:
Joint power allocation and relay selection scheme in untrusted UAV relays system
2021 IEEE 5th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC), 2021In order to solve the security problem in the downlink untrusted UAV multi-relay system, a joint power allocation and relay selection scheme with hardware impairment is proposed. In this scheme, cooperative jamming technology is applied to the untrusted UAV relay system. Firstly, the power allocation coefficient of artificial noise used for cooperative
Yue Li, Chen Jing, Yimeng Zhao
openaire +1 more source
Counterfactual quantum cryptography network with untrusted relay
International Journal of Modern Physics B, 2015Counterfactual quantum cryptography allows two remote parties to share a secret key even though a physical particle is not in fact transmitted through the quantum channel. In order to extend the scope of counterfactual quantum cryptography, we use an untrusted relay to construct a multi-user network. The implementation issues are discussed to show that
Chen, Yuanyuan +4 more
openaire +2 more sources
Performance of Untrusted Amplify-and-Forward Relaying
2013 4th International Conference on Intelligent Systems, Modelling and Simulation, 2013In this paper, we analyze the secrecy outage performance of amplify-and-forward (AF)-based relay networks consisting of a source, a destination, and an untrusted relay, where each terminal has a single antenna and operates in a half-duplex mode. In this network, the common message is transmitted through the relay-path, and the private message is ...
null MinChul Ju, null Do-Hoon Kim
openaire +1 more source
Multi-terminal networks with an untrusted relay
2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2014This paper investigates the impact of cooperation with an untrusted relay in multi-source multi-destination networks. The set up considered is one where the relay is the only means of communications due to the absence of direct links between the sources and the destinations.
Ahmed A. Zewail +2 more
openaire +1 more source
Cooperative non-orthogonal relaying for security enhancement in untrusted relay networks
2017 IEEE International Conference on Communications (ICC), 2017Recently, there has been a surge of increased interest in using physical layer security to safeguard the fifth generation (5G) mobile networks. In this paper, we study the problem of secure communications in untrusted relay networks. A new nonorthogonal relaying protocol is proposed, aiming at maximizing the secrecy rate.
Lu Lv, Qiang Ni, Zhiguo Ding, Jian Chen
openaire +1 more source
Relay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes
IEEE Transactions on Information Forensics and Security, 2016In this paper, the security aspect of an amplify-and-forward relaying network with untrusted relay nodes is considered. The untrusted nodes can help to forward the received signal and they may also try to decode such information, which can be regarded as potential eavesdroppers (Eves). To deal with such a challenging issue, a successive relaying scheme
Wei Wang, Kah Chan Teh, Kwok Hung Li
openaire +1 more source
Physical-layer secret key generation with untrusted relays
2014 IEEE Globecom Workshops (GC Wkshps), 2014In this paper, we propose a physical-layer secret key generation scheme for multi-antenna legitimate nodes with the help from multiple untrusted relays with single antenna. The relays' actions conform to the rules but they passively eavesdrop the information.
Chan Dai Truyen Thai +3 more
openaire +1 more source
Opportunistic Transmission of Nonregenerative Network With Untrusted Relay
IEEE Transactions on Vehicular Technology, 2015In this paper, we consider an opportunistic transmission scheme of nonregenerative relay networks consisting of a source, a destination, and an untrusted relay, where the relay has a different security clearance from the source–destination pair. In this network, the information is transmitted through the direct link if the secrecy rate of the direct ...
MinChul Ju, Do-Hoon Kim, Kyu-Sung Hwang
openaire +1 more source
Leaking Rate Region to Eavesdroppers and Untrusted Relays
2016 IEEE Global Communications Conference (GLOBECOM), 2016The trustworthiness of nodes in a network is practically a complicated concept and strongly depends on the social relationship among the nodes. For a certain model of trustworthiness, the scheme can be optimized to achieve the highest average secrecy rate based on pre-defined information about possibly malicious nodes.
Chan Dai Truyen Thai +2 more
openaire +1 more source

