Results 21 to 30 of about 3,690 (182)

Security and Reliability Trade-off in Device to Device Communications with Untrusted Relays [PDF]

open access: yesAUT Journal of Modeling and Simulation, 2020
In this paper, we investigate the trade-off between reliability and security in a device to device (D2D) network including a pair of D2D, an untrusted relay, and a jammer.
Marzieh Izanlou   +2 more
doaj   +1 more source

On the performance of physical layer security in virtual full-duplex non-orthogonal multiple access system

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
This paper investigates physical layer security analysis of cooperative non-orthogonal multiple access (NOMA) communication system. A virtual full-duplex (VFD) relaying scheme with an untrusted amplify-and-forward (AF) half-duplex (HD) relay and a ...
Weidong Guo, Yuxi Liu
doaj   +1 more source

Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer [PDF]

open access: yesAUT Journal of Electrical Engineering, 2016
—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the ...
Ali kuhestani   +2 more
doaj   +1 more source

Secure Transmission with Covert Requirement in Untrusted Relaying Networks [PDF]

open access: yes2018 9th International Symposium on Telecommunications (IST), 2018
13 pages, 8 figures, TIFS ...
Moslem Forouzesh   +2 more
openaire   +2 more sources

On the Achievable Secrecy Diversity of Cooperative Networks With Untrusted Relays [PDF]

open access: yesIEEE Transactions on Communications, 2018
Cooperative relaying is often deployed to enhance the communication reliability (i.e., diversity order) and consequently the end-to-end achievable rate. However, this raises several security concerns when the relays are untrusted since they may have access to the relayed message.
Mohaned Chraiti   +3 more
openaire   +4 more sources

Cooperative Jamming-Assisted Untrusted Relaying Based on Game Theory for Next-Generation Communication Systems

open access: yesApplied Sciences, 2023
In this contribution, we investigate the performance of an untrusted relaying system when Cooperative Jammers (CJs) are available. We propose two scenarios, Untrusted Relaying-aided Multiple Cooperative-Jammers-based Simultaneous Transmission (UR-MCJST ...
Nida Zamir   +5 more
doaj   +1 more source

Reliable and Secure Short-Packet Communications in Untrusted Diamond Relay Networks

open access: yesIEEE Access, 2023
This paper investigates short-packet communications over a diamond relay network with two untrusted relays (potential eavesdroppers) with the purpose of guaranteeing reliability and security simultaneously.
Shen Qian
doaj   +1 more source

Joint Antenna and User Selection for Untrusted Relay Networks [PDF]

open access: yes2018 IEEE Global Communications Conference (GLOBECOM), 2018
In this paper, we investigate secure communication for an untrusted relay network, in which a source equipped with $N_{S}$ antennas communicates to $M$ users with the help of an untrusted relay. To protect the data confidentially while concurrently relying on the untrusted relays, joint antenna and user selection scheme has been proposed with the ...
Bingtao He   +4 more
openaire   +1 more source

Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays

open access: yesIEEE Access, 2018
In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase
Van Nhan Vo   +3 more
doaj   +1 more source

MDI-QKD: Continuous- versus discrete-variables at metropolitan distances [PDF]

open access: yes, 2015
In a comment, Xu, Curty, Qi, Qian, and Lo claimed that discrete-variable (DV) measurement device independent (MDI) quantum key distribution (QKD) would compete with its continuous-variable (CV) counterpart at metropolitan distances. Actually, Xu et al.'s
Andersen, Ulrik L.   +8 more
core   +2 more sources

Home - About - Disclaimer - Privacy