Results 151 to 160 of about 3,690 (182)
Some of the next articles are maybe not open access.
The Symmetric Two-Hop Channel with an Untrusted Relay
2018 International Symposium on Information Theory and Its Applications (ISITA), 2018We study, using information-theoretic security methods, the so-called symmetric two-hop channel with an untrusted relay. In this model, a source wants to send its message reliably and securely to the destination through an honest but curious relay. The relay acts as a passive eavesdropper.
Shahab Ghasemi-Goojani +1 more
openaire +1 more source
Cooperative non-orthogonal relaying for security enhancement in untrusted relay networks
2017 IEEE International Conference on Communications (ICC), 2017Recently, there has been a surge of increased interest in using physical layer security to safeguard the fifth generation (5G) mobile networks. In this paper, we study the problem of secure communications in untrusted relay networks. A new nonorthogonal relaying protocol is proposed, aiming at maximizing the secrecy rate.
Lu Lv +3 more
openaire +1 more source
Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay
Wireless Personal Communications, 2013Two cooperative communication protocols, two-way and one-way half-duplex relayings, are investigated and then compared in the amplify-and-forward (AF) mode. The relay is assumed to play the roles of eavesdropper and relay (i.e., an untrusted relay). With a fair power constraint at each node, the secrecy rate of the one-way relaying protocol is proved ...
Nanrun Zhou +3 more
openaire +1 more source
Cooperation with an untrusted relay in broadcast channels
2013 IEEE International Symposium on Information Theory, 2013This paper studies secure communication over the broadcast channels with an untrusted relay. The relay helps users with transmission in broadcast channels, but we also wish to keep the information secret against the relay. Compress-and-forward relaying is a potential strategy to achieve secrecy.
openaire +1 more source
Performance of Untrusted Amplify-and-Forward Relaying
2013 4th International Conference on Intelligent Systems, Modelling and Simulation, 2013In this paper, we analyze the secrecy outage performance of amplify-and-forward (AF)-based relay networks consisting of a source, a destination, and an untrusted relay, where each terminal has a single antenna and operates in a half-duplex mode. In this network, the common message is transmitted through the relay-path, and the private message is ...
null MinChul Ju, null Do-Hoon Kim
openaire +1 more source
Secure OFDM transmission in wireless networks with untrusted relays
2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), 2017Physical layer security is becoming a promising technology to face the security challenges of diversified and rapidly-growing wireless applications. In this paper, we propose a three-hop secure Orthogonal Frequency Division Multiplexing (OFDM) transmission protocol for the wireless networks with untrusted relays.
Qiuli Dong, Guobing Li
openaire +1 more source
Physical-layer secret key generation with untrusted relays
2014 IEEE Globecom Workshops (GC Wkshps), 2014In this paper, we propose a physical-layer secret key generation scheme for multi-antenna legitimate nodes with the help from multiple untrusted relays with single antenna. The relays' actions conform to the rules but they passively eavesdrop the information.
Chan Dai Truyen Thai +3 more
openaire +1 more source
Characterization of untrusted relaying networks in the presence of an adversary jammer
Wireless Networks, 2019By considering an adversary jammer in a communication network, we investigate the secrecy performance of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward relay. We assume that either the source or the destination, as well as the jammer are equipped with large-scale multiple antennas systems, while
Hamed Saedi +2 more
openaire +1 more source
Secure cooperative untrusted-relay network with outdated CSI
2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016This paper studies the secrecy performance of an untrusted amplify-and-forward relaying network where both the relaying and the direct links are used to convey the source's information. Since relays act as eavesdroppers, a source-based jamming technique is proposed to keep the source's message secret from these helper nodes.
Asma Mabrouk +2 more
openaire +1 more source
Secure Power Allocation of Two-Way Relaying with an Untrusted Denoise-and-Forward Relay
2018 15th International Symposium on Wireless Communication Systems (ISWCS), 2018This paper proposes an secure transmit power allocation (STPA) scheme for a two-way denoise-and-forward (DNF) relaying network with the aim of maximizing the secrecy sum rate of the network. Here, the DNF relay could act not only as a forwarder but also a potential eavesdropper, i.e., an untrusted relay. First, the secure-rate-region of the two sources
Ruifeng Gao +4 more
openaire +1 more source

