Physical layer security: friendly Jamming in an untrusted relay scenario [PDF]
This paper investigates the achievable secrecy regions when employing a friendly jammer in a cooperative scenario employing an untrusted relay. The untrusted relay which helps to forward the source signal towards the destination, could also be regarded ...
Bakhtiar Ali +4 more
core +2 more sources
Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution
We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an
Yichen Zhang +6 more
doaj +4 more sources
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
This paper studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper and an eavesdropper. A security-aware relaying scheme is proposed, which employs the alternate jamming and secrecy-enhanced relay selection to prevent the confidential message from being ...
Li Sun, Pinyi Ren, Qinghe Du
exaly +2 more sources
Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals
We propose a new scheme to secure a wireless-powered untrusted cooperative-communication network, where a legitimate source node (Alice) transmits her information messages to a legitimate destination node (Bob) through the multiple amplify-and-forward ...
Ahmed El Shafie +2 more
exaly +3 more sources
General Secure Information Exchange Protocol for a Multiuser MIMO Relay Channel [PDF]
Secure information exchange occurs in many recently emerging cooperative-based networks, such as 5G networks (especially those with a Device to Device architecture), the Internet of Things, and vehicular ad hoc networks. However, the existing information
Qiao Liu, Hui Li, Yong Wang
doaj +2 more sources
Secure Communication via a Wireless Energy Harvesting Untrusted Relay [PDF]
The paper has been submitted for possible journal publication.
Sanket S Kalamkar, Adrish Banerjee
exaly +3 more sources
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation [PDF]
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference ...
Shiming Fu, Tong Ling, Jun Yang, Yong Li
doaj +2 more sources
Physical Layer Security in an Untrusted Energy Harvesting Relay Network [PDF]
The security performance in an amplify-and-forward dual-hop untrusted relay network is considered. It is assumed that the source and multiple destinations are equipped with multiple antennas, and the information transmission is aided by a single-antenna ...
Hui Shi +5 more
doaj +2 more sources
Security–reliability tradeoff analysis of untrusted energy harvesting relay networks
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen, Jianwei Hu, Weifeng Mou
exaly +2 more sources
High-Rate Cross-Channel Entanglement Swapping Between Independent On-Chip Sources. [PDF]
To interconnect individual chip‐based quantum sources, high‐performance entanglement swapping is indispensable. Here, using low‐loss silicon chips with waveguide structure and frequency‐offset pumps, this work demonstrates high‐rate cross‐channel entanglement swapping.
Wang H +5 more
europepmc +2 more sources

