Results 151 to 160 of about 3,650 (187)
Some of the next articles are maybe not open access.
Secure communications in fixed gain untrusted relay networks
2017 IEEE 17th International Conference on Communication Technology (ICCT), 2017This paper investigates secure communications in fixed gain untrusted relay networks. Unlike the trusted relay, an untrusted relay may be an eavesdropper and also does not have the instantaneous channel state information (CSI) of the main link. We propose a destination aided secure transmission scheme.
Mian Qin, Shouyi Yang, Hao Deng
openaire +1 more source
Secure cooperative untrusted-relay network with outdated CSI
2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016This paper studies the secrecy performance of an untrusted amplify-and-forward relaying network where both the relaying and the direct links are used to convey the source's information. Since relays act as eavesdroppers, a source-based jamming technique is proposed to keep the source's message secret from these helper nodes.
Asma Mabrouk +2 more
openaire +1 more source
The multiple access channel with an untrusted relay
2014 IEEE Information Theory Workshop (ITW 2014), 2014This paper considers a Gaussian multiple access channel aided by a relay. Specifically, the relay facilitates communication between multiple sources and a destination to which the sources have no direct link. In this set up, the relay node is considered to be untrusted, i.e., honest but curious, from whom the source messages need to be kept secret.
Ahmed A. Zewail, Aylin Yener
openaire +1 more source
Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay
Wireless Personal Communications, 2013Two cooperative communication protocols, two-way and one-way half-duplex relayings, are investigated and then compared in the amplify-and-forward (AF) mode. The relay is assumed to play the roles of eavesdropper and relay (i.e., an untrusted relay). With a fair power constraint at each node, the secrecy rate of the one-way relaying protocol is proved ...
Nanrun Zhou +3 more
openaire +1 more source
AN-Aided Relay-Selection Scheme for Securing Untrusted RF-EH Relay Systems
IEEE Transactions on Green Communications and Networking, 2017Energy harvesting (EH) technology has imposed new constraints on the amount of time an energy-constrained relay node needs to use for EH and information forwarding. Moreover, EH techniques may increase vulnerability to eavesdropping, since a power receiver, as a potential eavesdropper, usually has a shorter access distance than an information receiver.
Asma Mabrouk +3 more
openaire +1 more source
Secure Relay Selection for Two Way Amplify-and-Forward Untrusted Relaying Networks
IEEE Transactions on Vehicular Technology, 2018Relay assisted communication helps to extend the transmission coverage area. In more realistic scenarios, the available relays are untrusted, which try to decode the confidential signals during their main relaying function. Thus, these untrusted relays are regarded as potential eavesdroppers, and the confidential signals are vulnerable.
Tamer Mekkawy +3 more
openaire +1 more source
Cross-layer security in two-hop wireless Gaussian relay network with untrusted relays
2013 IEEE International Conference on Communications (ICC), 2013This paper deals with the challenge of providing information-theoretic secrecy in a two-hop wireless channel with multiple untrusted relay nodes. Instead of perfect secrecy (in the information-theoretic sense), of interest here is a cross-layer approach where only parts of relayed information are protected at the physical layer against eavesdropping at
Michal Kaliszan +2 more
openaire +1 more source
Cooperation with an untrusted relay in broadcast channels
2013 IEEE International Symposium on Information Theory, 2013This paper studies secure communication over the broadcast channels with an untrusted relay. The relay helps users with transmission in broadcast channels, but we also wish to keep the information secret against the relay. Compress-and-forward relaying is a potential strategy to achieve secrecy.
openaire +1 more source
Security-concern relaying scheme for amplify-and-forward network with untrusted relay nodes
2016 5th International Conference on Computer Science and Network Technology (ICCSNT), 2016The Physical Layer Security (PLS) technology has been proved to be an effective way to reduce information leakage in wireless communication networks. This paper discusses the problem of secure transmission for Amplify-and-Forward (AF) cooperative network which contains both an external eavesdropper and some untrusted relays at the same time, where each
Huiying Song +4 more
openaire +1 more source
Physical-Layer Secret Key Generation With Colluding Untrusted Relays
IEEE Transactions on Wireless Communications, 2016In this paper, we propose a physical-layer secret key generation scheme for multiantenna legitimate nodes with the help of multiple untrusted relays, equipped with multiple antennas. The untrusted relays conform to the relaying transmission protocol of legitimate nodes, but they also eavesdrop the confidential information of an legitimate transmitter ...
Chan Dai Truyen Thai +2 more
openaire +1 more source

