Results 21 to 30 of about 3,690 (182)
Security and Reliability Trade-off in Device to Device Communications with Untrusted Relays [PDF]
In this paper, we investigate the trade-off between reliability and security in a device to device (D2D) network including a pair of D2D, an untrusted relay, and a jammer.
Marzieh Izanlou +2 more
doaj +1 more source
This paper investigates physical layer security analysis of cooperative non-orthogonal multiple access (NOMA) communication system. A virtual full-duplex (VFD) relaying scheme with an untrusted amplify-and-forward (AF) half-duplex (HD) relay and a ...
Weidong Guo, Yuxi Liu
doaj +1 more source
Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer [PDF]
—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the ...
Ali kuhestani +2 more
doaj +1 more source
Secure Transmission with Covert Requirement in Untrusted Relaying Networks [PDF]
13 pages, 8 figures, TIFS ...
Moslem Forouzesh +2 more
openaire +2 more sources
On the Achievable Secrecy Diversity of Cooperative Networks With Untrusted Relays [PDF]
Cooperative relaying is often deployed to enhance the communication reliability (i.e., diversity order) and consequently the end-to-end achievable rate. However, this raises several security concerns when the relays are untrusted since they may have access to the relayed message.
Mohaned Chraiti +3 more
openaire +4 more sources
In this contribution, we investigate the performance of an untrusted relaying system when Cooperative Jammers (CJs) are available. We propose two scenarios, Untrusted Relaying-aided Multiple Cooperative-Jammers-based Simultaneous Transmission (UR-MCJST ...
Nida Zamir +5 more
doaj +1 more source
Reliable and Secure Short-Packet Communications in Untrusted Diamond Relay Networks
This paper investigates short-packet communications over a diamond relay network with two untrusted relays (potential eavesdroppers) with the purpose of guaranteeing reliability and security simultaneously.
Shen Qian
doaj +1 more source
Joint Antenna and User Selection for Untrusted Relay Networks [PDF]
In this paper, we investigate secure communication for an untrusted relay network, in which a source equipped with $N_{S}$ antennas communicates to $M$ users with the help of an untrusted relay. To protect the data confidentially while concurrently relying on the untrusted relays, joint antenna and user selection scheme has been proposed with the ...
Bingtao He +4 more
openaire +1 more source
In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase
Van Nhan Vo +3 more
doaj +1 more source
MDI-QKD: Continuous- versus discrete-variables at metropolitan distances [PDF]
In a comment, Xu, Curty, Qi, Qian, and Lo claimed that discrete-variable (DV) measurement device independent (MDI) quantum key distribution (QKD) would compete with its continuous-variable (CV) counterpart at metropolitan distances. Actually, Xu et al.'s
Andersen, Ulrik L. +8 more
core +2 more sources

