Results 151 to 160 of about 3,690 (182)
Some of the next articles are maybe not open access.

The Symmetric Two-Hop Channel with an Untrusted Relay

2018 International Symposium on Information Theory and Its Applications (ISITA), 2018
We study, using information-theoretic security methods, the so-called symmetric two-hop channel with an untrusted relay. In this model, a source wants to send its message reliably and securely to the destination through an honest but curious relay. The relay acts as a passive eavesdropper.
Shahab Ghasemi-Goojani   +1 more
openaire   +1 more source

Cooperative non-orthogonal relaying for security enhancement in untrusted relay networks

2017 IEEE International Conference on Communications (ICC), 2017
Recently, there has been a surge of increased interest in using physical layer security to safeguard the fifth generation (5G) mobile networks. In this paper, we study the problem of secure communications in untrusted relay networks. A new nonorthogonal relaying protocol is proposed, aiming at maximizing the secrecy rate.
Lu Lv   +3 more
openaire   +1 more source

Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay

Wireless Personal Communications, 2013
Two cooperative communication protocols, two-way and one-way half-duplex relayings, are investigated and then compared in the amplify-and-forward (AF) mode. The relay is assumed to play the roles of eavesdropper and relay (i.e., an untrusted relay). With a fair power constraint at each node, the secrecy rate of the one-way relaying protocol is proved ...
Nanrun Zhou   +3 more
openaire   +1 more source

Cooperation with an untrusted relay in broadcast channels

2013 IEEE International Symposium on Information Theory, 2013
This paper studies secure communication over the broadcast channels with an untrusted relay. The relay helps users with transmission in broadcast channels, but we also wish to keep the information secret against the relay. Compress-and-forward relaying is a potential strategy to achieve secrecy.
openaire   +1 more source

Performance of Untrusted Amplify-and-Forward Relaying

2013 4th International Conference on Intelligent Systems, Modelling and Simulation, 2013
In this paper, we analyze the secrecy outage performance of amplify-and-forward (AF)-based relay networks consisting of a source, a destination, and an untrusted relay, where each terminal has a single antenna and operates in a half-duplex mode. In this network, the common message is transmitted through the relay-path, and the private message is ...
null MinChul Ju, null Do-Hoon Kim
openaire   +1 more source

Secure OFDM transmission in wireless networks with untrusted relays

2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), 2017
Physical layer security is becoming a promising technology to face the security challenges of diversified and rapidly-growing wireless applications. In this paper, we propose a three-hop secure Orthogonal Frequency Division Multiplexing (OFDM) transmission protocol for the wireless networks with untrusted relays.
Qiuli Dong, Guobing Li
openaire   +1 more source

Physical-layer secret key generation with untrusted relays

2014 IEEE Globecom Workshops (GC Wkshps), 2014
In this paper, we propose a physical-layer secret key generation scheme for multi-antenna legitimate nodes with the help from multiple untrusted relays with single antenna. The relays' actions conform to the rules but they passively eavesdrop the information.
Chan Dai Truyen Thai   +3 more
openaire   +1 more source

Characterization of untrusted relaying networks in the presence of an adversary jammer

Wireless Networks, 2019
By considering an adversary jammer in a communication network, we investigate the secrecy performance of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward relay. We assume that either the source or the destination, as well as the jammer are equipped with large-scale multiple antennas systems, while
Hamed Saedi   +2 more
openaire   +1 more source

Secure cooperative untrusted-relay network with outdated CSI

2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016
This paper studies the secrecy performance of an untrusted amplify-and-forward relaying network where both the relaying and the direct links are used to convey the source's information. Since relays act as eavesdroppers, a source-based jamming technique is proposed to keep the source's message secret from these helper nodes.
Asma Mabrouk   +2 more
openaire   +1 more source

Secure Power Allocation of Two-Way Relaying with an Untrusted Denoise-and-Forward Relay

2018 15th International Symposium on Wireless Communication Systems (ISWCS), 2018
This paper proposes an secure transmit power allocation (STPA) scheme for a two-way denoise-and-forward (DNF) relaying network with the aim of maximizing the secrecy sum rate of the network. Here, the DNF relay could act not only as a forwarder but also a potential eavesdropper, i.e., an untrusted relay. First, the secure-rate-region of the two sources
Ruifeng Gao   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy