Results 151 to 160 of about 3,650 (187)
Some of the next articles are maybe not open access.

Secure communications in fixed gain untrusted relay networks

2017 IEEE 17th International Conference on Communication Technology (ICCT), 2017
This paper investigates secure communications in fixed gain untrusted relay networks. Unlike the trusted relay, an untrusted relay may be an eavesdropper and also does not have the instantaneous channel state information (CSI) of the main link. We propose a destination aided secure transmission scheme.
Mian Qin, Shouyi Yang, Hao Deng
openaire   +1 more source

Secure cooperative untrusted-relay network with outdated CSI

2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016
This paper studies the secrecy performance of an untrusted amplify-and-forward relaying network where both the relaying and the direct links are used to convey the source's information. Since relays act as eavesdroppers, a source-based jamming technique is proposed to keep the source's message secret from these helper nodes.
Asma Mabrouk   +2 more
openaire   +1 more source

The multiple access channel with an untrusted relay

2014 IEEE Information Theory Workshop (ITW 2014), 2014
This paper considers a Gaussian multiple access channel aided by a relay. Specifically, the relay facilitates communication between multiple sources and a destination to which the sources have no direct link. In this set up, the relay node is considered to be untrusted, i.e., honest but curious, from whom the source messages need to be kept secret.
Ahmed A. Zewail, Aylin Yener
openaire   +1 more source

Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay

Wireless Personal Communications, 2013
Two cooperative communication protocols, two-way and one-way half-duplex relayings, are investigated and then compared in the amplify-and-forward (AF) mode. The relay is assumed to play the roles of eavesdropper and relay (i.e., an untrusted relay). With a fair power constraint at each node, the secrecy rate of the one-way relaying protocol is proved ...
Nanrun Zhou   +3 more
openaire   +1 more source

AN-Aided Relay-Selection Scheme for Securing Untrusted RF-EH Relay Systems

IEEE Transactions on Green Communications and Networking, 2017
Energy harvesting (EH) technology has imposed new constraints on the amount of time an energy-constrained relay node needs to use for EH and information forwarding. Moreover, EH techniques may increase vulnerability to eavesdropping, since a power receiver, as a potential eavesdropper, usually has a shorter access distance than an information receiver.
Asma Mabrouk   +3 more
openaire   +1 more source

Secure Relay Selection for Two Way Amplify-and-Forward Untrusted Relaying Networks

IEEE Transactions on Vehicular Technology, 2018
Relay assisted communication helps to extend the transmission coverage area. In more realistic scenarios, the available relays are untrusted, which try to decode the confidential signals during their main relaying function. Thus, these untrusted relays are regarded as potential eavesdroppers, and the confidential signals are vulnerable.
Tamer Mekkawy   +3 more
openaire   +1 more source

Cross-layer security in two-hop wireless Gaussian relay network with untrusted relays

2013 IEEE International Conference on Communications (ICC), 2013
This paper deals with the challenge of providing information-theoretic secrecy in a two-hop wireless channel with multiple untrusted relay nodes. Instead of perfect secrecy (in the information-theoretic sense), of interest here is a cross-layer approach where only parts of relayed information are protected at the physical layer against eavesdropping at
Michal Kaliszan   +2 more
openaire   +1 more source

Cooperation with an untrusted relay in broadcast channels

2013 IEEE International Symposium on Information Theory, 2013
This paper studies secure communication over the broadcast channels with an untrusted relay. The relay helps users with transmission in broadcast channels, but we also wish to keep the information secret against the relay. Compress-and-forward relaying is a potential strategy to achieve secrecy.
openaire   +1 more source

Security-concern relaying scheme for amplify-and-forward network with untrusted relay nodes

2016 5th International Conference on Computer Science and Network Technology (ICCSNT), 2016
The Physical Layer Security (PLS) technology has been proved to be an effective way to reduce information leakage in wireless communication networks. This paper discusses the problem of secure transmission for Amplify-and-Forward (AF) cooperative network which contains both an external eavesdropper and some untrusted relays at the same time, where each
Huiying Song   +4 more
openaire   +1 more source

Physical-Layer Secret Key Generation With Colluding Untrusted Relays

IEEE Transactions on Wireless Communications, 2016
In this paper, we propose a physical-layer secret key generation scheme for multiantenna legitimate nodes with the help of multiple untrusted relays, equipped with multiple antennas. The untrusted relays conform to the relaying transmission protocol of legitimate nodes, but they also eavesdrop the confidential information of an legitimate transmitter ...
Chan Dai Truyen Thai   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy