Results 11 to 20 of about 3,690 (182)

Physical layer security: friendly Jamming in an untrusted relay scenario [PDF]

open access: yes2016 24th European Signal Processing Conference (EUSIPCO), 2016
This paper investigates the achievable secrecy regions when employing a friendly jammer in a cooperative scenario employing an untrusted relay. The untrusted relay which helps to forward the source signal towards the destination, could also be regarded ...
Bakhtiar Ali   +4 more
core   +2 more sources

Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution

open access: yesEntropy, 2015
We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an
Yichen Zhang   +6 more
doaj   +4 more sources

Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes

open access: yesIEEE Communications Letters, 2015
This paper studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper and an eavesdropper. A security-aware relaying scheme is proposed, which employs the alternate jamming and secrecy-enhanced relay selection to prevent the confidential message from being ...
Li Sun, Pinyi Ren, Qinghe Du
exaly   +2 more sources

Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals

open access: yesIEEE Access, 2017
We propose a new scheme to secure a wireless-powered untrusted cooperative-communication network, where a legitimate source node (Alice) transmits her information messages to a legitimate destination node (Bob) through the multiple amplify-and-forward ...
Ahmed El Shafie   +2 more
exaly   +3 more sources

General Secure Information Exchange Protocol for a Multiuser MIMO Relay Channel [PDF]

open access: yesEntropy, 2019
Secure information exchange occurs in many recently emerging cooperative-based networks, such as 5G networks (especially those with a Device to Device architecture), the Internet of Things, and vehicular ad hoc networks. However, the existing information
Qiao Liu, Hui Li, Yong Wang
doaj   +2 more sources

Secure Communication via a Wireless Energy Harvesting Untrusted Relay [PDF]

open access: yesIEEE Transactions on Vehicular Technology, 2017
The paper has been submitted for possible journal publication.
Sanket S Kalamkar, Adrish Banerjee
exaly   +3 more sources

Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation [PDF]

open access: yesEntropy
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference ...
Shiming Fu, Tong Ling, Jun Yang, Yong Li
doaj   +2 more sources

Physical Layer Security in an Untrusted Energy Harvesting Relay Network [PDF]

open access: yesIEEE Access, 2019
The security performance in an amplify-and-forward dual-hop untrusted relay network is considered. It is assumed that the source and multiple destinations are equipped with multiple antennas, and the information transmission is aided by a single-antenna ...
Hui Shi   +5 more
doaj   +2 more sources

Security–reliability tradeoff analysis of untrusted energy harvesting relay networks

open access: yesInternational Journal of Distributed Sensor Networks, 2018
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen, Jianwei Hu, Weifeng Mou
exaly   +2 more sources

High-Rate Cross-Channel Entanglement Swapping Between Independent On-Chip Sources. [PDF]

open access: yesAdv Sci (Weinh)
To interconnect individual chip‐based quantum sources, high‐performance entanglement swapping is indispensable. Here, using low‐loss silicon chips with waveguide structure and frequency‐offset pumps, this work demonstrates high‐rate cross‐channel entanglement swapping.
Wang H   +5 more
europepmc   +2 more sources

Home - About - Disclaimer - Privacy