Results 21 to 30 of about 3,650 (187)

Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals

open access: yesIEEE Access, 2017
We propose a new scheme to secure a wireless-powered untrusted cooperative-communication network, where a legitimate source node (Alice) transmits her information messages to a legitimate destination node (Bob) through the multiple amplify-and-forward ...
Ahmed El Shafie   +4 more
doaj   +1 more source

Security‐Reliability Tradeoff Analysis of Untrusted Full‐Duplex Relay Networks

open access: yesWireless Communications and Mobile Computing, 2022
In this work, we investigate the physical layer security problem of wireless cooperative network, where the communication from a source to a destination is assisted by an untrusted full‐duplex amplify‐and‐forward (AF) relay. In order to realize a positive secrecy rate, cooperative jamming is exploited at the destination. The secrecy outage probability (
Xingang Zhang   +4 more
openaire   +1 more source

Reliable and Secure Short-Packet Communications in Untrusted Diamond Relay Networks

open access: yesIEEE Access, 2023
This paper investigates short-packet communications over a diamond relay network with two untrusted relays (potential eavesdroppers) with the purpose of guaranteeing reliability and security simultaneously.
Shen Qian
doaj   +1 more source

Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]

open access: yes, 2017
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin   +5 more
core   +3 more sources

Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays

open access: yesIEEE Access, 2018
In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase
Van Nhan Vo   +3 more
doaj   +1 more source

MDI-QKD: Continuous- versus discrete-variables at metropolitan distances [PDF]

open access: yes, 2015
In a comment, Xu, Curty, Qi, Qian, and Lo claimed that discrete-variable (DV) measurement device independent (MDI) quantum key distribution (QKD) would compete with its continuous-variable (CV) counterpart at metropolitan distances. Actually, Xu et al.'s
Andersen, Ulrik L.   +8 more
core   +2 more sources

Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes

open access: yesIEEE Communications Letters, 2015
This paper studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper and an eavesdropper. A security-aware relaying scheme is proposed, which employs the alternate jamming and secrecy-enhanced relay selection to prevent the confidential message from being ...
Li Sun   +4 more
openaire   +1 more source

Quantum cryptography with an ideal local relay [PDF]

open access: yes, 2015
We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection.
Andersen, Ulrik L.   +6 more
core   +3 more sources

Channel Phase Based Secret Key Generation: Untrusted Relaying or Not? [PDF]

open access: yesAUT Journal of Modeling and Simulation
Compared to traditional cryptography methods, physical layer secret key generation (PLSKG) can be more efficient and well-suited for Internet-of-Things (IoT) owing to its lightweight nature and scalability.
Mohammadreza Keshavarzi   +3 more
doaj   +1 more source

Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks

open access: yesIEEE Internet of Things Journal, 2023
Abstract This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay \(R\). For the covertness, we attempt to prevent Willie from detecting the very existence of communications ...
Ranran Sun   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy