Results 21 to 30 of about 3,650 (187)
Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals
We propose a new scheme to secure a wireless-powered untrusted cooperative-communication network, where a legitimate source node (Alice) transmits her information messages to a legitimate destination node (Bob) through the multiple amplify-and-forward ...
Ahmed El Shafie +4 more
doaj +1 more source
Security‐Reliability Tradeoff Analysis of Untrusted Full‐Duplex Relay Networks
In this work, we investigate the physical layer security problem of wireless cooperative network, where the communication from a source to a destination is assisted by an untrusted full‐duplex amplify‐and‐forward (AF) relay. In order to realize a positive secrecy rate, cooperative jamming is exploited at the destination. The secrecy outage probability (
Xingang Zhang +4 more
openaire +1 more source
Reliable and Secure Short-Packet Communications in Untrusted Diamond Relay Networks
This paper investigates short-packet communications over a diamond relay network with two untrusted relays (potential eavesdroppers) with the purpose of guaranteeing reliability and security simultaneously.
Shen Qian
doaj +1 more source
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin +5 more
core +3 more sources
In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase
Van Nhan Vo +3 more
doaj +1 more source
MDI-QKD: Continuous- versus discrete-variables at metropolitan distances [PDF]
In a comment, Xu, Curty, Qi, Qian, and Lo claimed that discrete-variable (DV) measurement device independent (MDI) quantum key distribution (QKD) would compete with its continuous-variable (CV) counterpart at metropolitan distances. Actually, Xu et al.'s
Andersen, Ulrik L. +8 more
core +2 more sources
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
This paper studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper and an eavesdropper. A security-aware relaying scheme is proposed, which employs the alternate jamming and secrecy-enhanced relay selection to prevent the confidential message from being ...
Li Sun +4 more
openaire +1 more source
Quantum cryptography with an ideal local relay [PDF]
We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection.
Andersen, Ulrik L. +6 more
core +3 more sources
Channel Phase Based Secret Key Generation: Untrusted Relaying or Not? [PDF]
Compared to traditional cryptography methods, physical layer secret key generation (PLSKG) can be more efficient and well-suited for Internet-of-Things (IoT) owing to its lightweight nature and scalability.
Mohammadreza Keshavarzi +3 more
doaj +1 more source
Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks
Abstract This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay \(R\). For the covertness, we attempt to prevent Willie from detecting the very existence of communications ...
Ranran Sun +4 more
openaire +2 more sources

