Results 161 to 170 of about 3,690 (182)
Some of the next articles are maybe not open access.

Buffer-Aided Relay Selection for Wireless Cooperative Relay Networks with Untrusted Relays

2021 International Conference on Networking and Network Applications (NaNA), 2021
Cheng Zhang   +3 more
openaire   +1 more source

Counterfactual quantum cryptography network with untrusted relay

International Journal of Modern Physics B, 2015
Counterfactual quantum cryptography allows two remote parties to share a secret key even though a physical particle is not in fact transmitted through the quantum channel. In order to extend the scope of counterfactual quantum cryptography, we use an untrusted relay to construct a multi-user network. The implementation issues are discussed to show that
Chen, Yuanyuan   +4 more
openaire   +2 more sources

Cross-layer security in two-hop wireless Gaussian relay network with untrusted relays

2013 IEEE International Conference on Communications (ICC), 2013
This paper deals with the challenge of providing information-theoretic secrecy in a two-hop wireless channel with multiple untrusted relay nodes. Instead of perfect secrecy (in the information-theoretic sense), of interest here is a cross-layer approach where only parts of relayed information are protected at the physical layer against eavesdropping at
Michal Kaliszan   +2 more
openaire   +1 more source

Partial Relay Selection for Secure Outdated-CSI AF in Untrusted-Relay Networks

2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019
In this paper, we study secure outdated-channelstate-information amplify-and-forward (SO-CSI-AF) relaying network using partial relay selection method. The best relay node is chosen based on the maximum instantaneous signal-tonoise ratio (SNR) of the first hop.
openaire   +1 more source

Exploiting Adaptive Jamming in Secure Cooperative NOMA with an Untrusted Relay

ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019
We study secure communications with an untrusted relay for a cooperative non-orthogonal multiple access (NOMA) system, where a base station (BS) serves a near user (NU) and a far user (FU) by the NOMA principle, and transmission between BS and FU is aided by an untrusted relay.
Lu Lv   +4 more
openaire   +1 more source

Link adaptation for fixed relaying with untrusted relays: Transmission strategy design and performance analysis

2011 18th International Conference on Telecommunications, 2011
Wireless cooperative communication through link adaptation with untrusted relay assignment is considered. Using sharp channel codes in different transmission modes, reliability for destination and security in the presence of untrusted relays are provided through rate and power allocation. Scenarios with single available relay and opportunistic relaying
Hamid Khodakarami, Farshad Lahouti
openaire   +1 more source

Physical-Layer Secret Key Generation With Colluding Untrusted Relays

IEEE Transactions on Wireless Communications, 2016
In this paper, we propose a physical-layer secret key generation scheme for multiantenna legitimate nodes with the help of multiple untrusted relays, equipped with multiple antennas. The untrusted relays conform to the relaying transmission protocol of legitimate nodes, but they also eavesdrop the confidential information of an legitimate transmitter ...
Chan Dai Truyen Thai   +2 more
openaire   +1 more source

Secure Relay Selection for Two-Way Untrusted Relaying Networks

SSRN Electronic Journal, 2022
Kan Yu   +3 more
openaire   +1 more source

Joint Power Allocation and Relay Selection Scheme in Multiple Untrusted Relay Networks

2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), 2022
Wanying Su   +5 more
openaire   +1 more source

Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay

Future Generation Computer Systems, 2020
Heejung Yu, Il-Gu Lee
exaly  

Home - About - Disclaimer - Privacy