Results 141 to 150 of about 3,690 (182)
Some of the next articles are maybe not open access.

Opportunistic Transmission of Nonregenerative Network With Untrusted Relay

IEEE Transactions on Vehicular Technology, 2015
In this paper, we consider an opportunistic transmission scheme of nonregenerative relay networks consisting of a source, a destination, and an untrusted relay, where the relay has a different security clearance from the source–destination pair. In this network, the information is transmitted through the direct link if the secrecy rate of the direct ...
Minchul Ju, Do-Hoon Kim
exaly   +2 more sources

Relay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes

IEEE Transactions on Information Forensics and Security, 2016
In this paper, the security aspect of an amplify-and-forward relaying network with untrusted relay nodes is considered. The untrusted nodes can help to forward the received signal and they may also try to decode such information, which can be regarded as potential eavesdroppers (Eves). To deal with such a challenging issue, a successive relaying scheme
Wei Wang, Kah Chan Teh, Kwok Hung Li
exaly   +2 more sources

Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach

IEEE Transactions on Information Forensics and Security, 2019
We propose a novel non-orthogonal multiple access (NOMA)-inspired jamming and relaying scheme to enhance the physical layer security of untrusted relay networks. Particularly, during the first phase, with the application of the downlink NOMA principle, the source sends a superimposed version of a desired signal and a jamming signal, where the jamming ...
Lu Lv, Fuhui Zhou, Jian Chen
exaly   +2 more sources

Secure Relay Selection for Two Way Amplify-and-Forward Untrusted Relaying Networks

IEEE Transactions on Vehicular Technology, 2018
Relay assisted communication helps to extend the transmission coverage area. In more realistic scenarios, the available relays are untrusted, which try to decode the confidential signals during their main relaying function. Thus, these untrusted relays are regarded as potential eavesdroppers, and the confidential signals are vulnerable.
Tamer Mekkawy, Rugui Yao, Nan Qi
exaly   +2 more sources

AN-Aided Relay-Selection Scheme for Securing Untrusted RF-EH Relay Systems

IEEE Transactions on Green Communications and Networking, 2017
Energy harvesting (EH) technology has imposed new constraints on the amount of time an energy-constrained relay node needs to use for EH and information forwarding. Moreover, EH techniques may increase vulnerability to eavesdropping, since a power receiver, as a potential eavesdropper, usually has a shorter access distance than an information receiver.
Asma Mabrouk   +2 more
exaly   +2 more sources

The multiple access channel with an untrusted relay

2014 IEEE Information Theory Workshop (ITW 2014), 2014
This paper considers a Gaussian multiple access channel aided by a relay. Specifically, the relay facilitates communication between multiple sources and a destination to which the sources have no direct link. In this set up, the relay node is considered to be untrusted, i.e., honest but curious, from whom the source messages need to be kept secret.
Ahmed A. Zewail, Aylin Yener
openaire   +1 more source

The role of an untrusted relay in secret communication

2008 IEEE International Symposium on Information Theory, 2008
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. A class of relay channels with orthogonal components is considered and an upper bound on the secrecy rate is derived.
Xiang He 0001, Aylin Yener
openaire   +1 more source

Multi-terminal networks with an untrusted relay

2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2014
This paper investigates the impact of cooperation with an untrusted relay in multi-source multi-destination networks. The set up considered is one where the relay is the only means of communications due to the absence of direct links between the sources and the destinations.
Ahmed A. Zewail   +2 more
openaire   +1 more source

Leaking Rate Region to Eavesdroppers and Untrusted Relays

2016 IEEE Global Communications Conference (GLOBECOM), 2016
The trustworthiness of nodes in a network is practically a complicated concept and strongly depends on the social relationship among the nodes. For a certain model of trustworthiness, the scheme can be optimized to achieve the highest average secrecy rate based on pre-defined information about possibly malicious nodes.
Chan Dai Truyen Thai   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy