Results 161 to 170 of about 3,650 (187)
Some of the next articles are maybe not open access.
Buffer-Aided Relay Selection for Wireless Cooperative Relay Networks with Untrusted Relays
2021 International Conference on Networking and Network Applications (NaNA), 2021Cheng Zhang +3 more
openaire +1 more source
Secure Relay Selection for Two-Way Untrusted Relaying Networks
SSRN Electronic Journal, 2022Kan Yu +3 more
openaire +1 more source
Partial Relay Selection for Secure Outdated-CSI AF in Untrusted-Relay Networks
2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019In this paper, we study secure outdated-channelstate-information amplify-and-forward (SO-CSI-AF) relaying network using partial relay selection method. The best relay node is chosen based on the maximum instantaneous signal-tonoise ratio (SNR) of the first hop.
openaire +1 more source
Secrecy performance of untrusted relay’s cooperation under fading channels
Transactions of Tianjin University, 2011The secrecy performance of cooperation with an untrusted relay under a quasi-static fading channel is analyzed in this paper. An achievable secrecy rate is provided and the influence of selfish behavior of untrusted relay is analyzed. Furthermore, the secrecy performance of the scheme is discussed and compared with that of the case where the relay is ...
Xiaomei Fu +3 more
openaire +1 more source
Secure OFDM transmission in wireless networks with untrusted relays
2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), 2017Physical layer security is becoming a promising technology to face the security challenges of diversified and rapidly-growing wireless applications. In this paper, we propose a three-hop secure Orthogonal Frequency Division Multiplexing (OFDM) transmission protocol for the wireless networks with untrusted relays.
Qiuli Dong, Guobing Li
openaire +1 more source
Secret key generation from static channels with untrusted relays
2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2015The generation of symmetric cryptographic keys based on reciprocal channel properties has evolved as a promising approach in recent years, especially for devices with only little computational power. Different schemes individually addressing constraints from special setups have been proposed, but most schemes generally suffer from bad performance in ...
Guillaume, René +3 more
openaire +1 more source
The Symmetric Two-Hop Channel with an Untrusted Relay
2018 International Symposium on Information Theory and Its Applications (ISITA), 2018We study, using information-theoretic security methods, the so-called symmetric two-hop channel with an untrusted relay. In this model, a source wants to send its message reliably and securely to the destination through an honest but curious relay. The relay acts as a passive eavesdropper.
Shahab Ghasemi-Goojani +1 more
openaire +1 more source
Joint Power Allocation and Relay Selection Scheme in Multiple Untrusted Relay Networks
2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), 2022Wanying Su +5 more
openaire +1 more source
Alloying of Cu with Ru Enabling the Relay Catalysis for Reduction of Nitrate to Ammonia
Advanced Materials, 2023Wensheng Gao, Can Li
exaly

