Results 11 to 20 of about 3,650 (187)
General Secure Information Exchange Protocol for a Multiuser MIMO Relay Channel [PDF]
Secure information exchange occurs in many recently emerging cooperative-based networks, such as 5G networks (especially those with a Device to Device architecture), the Internet of Things, and vehicular ad hoc networks. However, the existing information
Qiao Liu, Hui Li, Yong Wang
doaj +2 more sources
Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer [PDF]
—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the ...
Ali kuhestani +2 more
doaj +2 more sources
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation [PDF]
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference ...
Shiming Fu, Tong Ling, Jun Yang, Yong Li
doaj +2 more sources
Cooperative Secure Transmission in the Presence of Untrusted Relay [PDF]
Considering a nonregenerative untrusted relay network, we investigate three different secure transmission strategies, for example, noncooperative strategy, conventional amplify-and-forward (AF) strategy, and cooperative jamming (CJ) strategy.
Dechuan Chen +4 more
doaj +2 more sources
Impact of Outdated CSI on the Secure Communication in Untrusted In-Band Full-Duplex Relay Networks
To provide reliable connectivity in recent and future wireless communication systems, it is necessary to deploy several relay nodes. Further, a full-duplex (FD) technique has been in the spotlight since it can significantly improve spectral efficiency ...
Jin-Taek Lim, Taehoon Kim, Inkyu Bang
doaj +1 more source
Security and Reliability Trade-off in Device to Device Communications with Untrusted Relays [PDF]
In this paper, we investigate the trade-off between reliability and security in a device to device (D2D) network including a pair of D2D, an untrusted relay, and a jammer.
Marzieh Izanlou +2 more
doaj +1 more source
This paper investigates physical layer security analysis of cooperative non-orthogonal multiple access (NOMA) communication system. A virtual full-duplex (VFD) relaying scheme with an untrusted amplify-and-forward (AF) half-duplex (HD) relay and a ...
Weidong Guo, Yuxi Liu
doaj +1 more source
Secure Transmission with Covert Requirement in Untrusted Relaying Networks [PDF]
13 pages, 8 figures, TIFS ...
Forouzesh, Moslem +2 more
openaire +2 more sources
Secure Communication via a Wireless Energy Harvesting Untrusted Relay [PDF]
The paper has been submitted for possible journal publication.
Kalamkar, Sanket S., Banerjee, Adrish
openaire +2 more sources
In this contribution, we investigate the performance of an untrusted relaying system when Cooperative Jammers (CJs) are available. We propose two scenarios, Untrusted Relaying-aided Multiple Cooperative-Jammers-based Simultaneous Transmission (UR-MCJST ...
Nida Zamir +5 more
doaj +1 more source

