Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin +5 more
core +3 more sources
On the Secrecy Performance and Power Allocation in Relaying Networks With Untrusted Relay in the Partial Secrecy Regime [PDF]
Recently, three useful secrecy metrics based on the partial secrecy regime were proposed to analyze secure transmissions on wireless systems over quasi-static fading channels, namely: generalized secrecy outage probability, average fractional equivocation, and average information leakage.
Diana Pamela Moya Osorio +2 more
openaire +4 more sources
Channel Phase Based Secret Key Generation: Untrusted Relaying or Not? [PDF]
Compared to traditional cryptography methods, physical layer secret key generation (PLSKG) can be more efficient and well-suited for Internet-of-Things (IoT) owing to its lightweight nature and scalability.
Mohammadreza Keshavarzi +3 more
doaj +1 more source
In this paper, a cooperative orthogonal frequency division multiplexing system with multiple untrusted amplify‐and‐forward relays is considered. Since there exists no direct link between source and user because of the shadowing effect, a positive system ...
Yifeng Jin +4 more
doaj +1 more source
Measurement-device-independent quantum key distribution over untrustful metropolitan network [PDF]
Quantum cryptography holds the promise to establish an information-theoretically secure global network. All field tests of metropolitan-scale quantum networks to date are based on trusted relays.
Chen, Si-Jing +17 more
core +3 more sources
Securing Relay Networks with Artificial Noise: An Error Performance-Based Approach
We apply the concept of artificial and controlled interference in a two-hop relay network with an untrusted relay, aiming at enhancing the wireless communication secrecy between the source and the destination node.
Ying Liu +3 more
doaj +1 more source
Successive relaying secure transmission scheme based on inter-relay interference cancellation
A secure scheme based on inter-relay interference cancellation was proposed to solve untrusted relay eavesdropping problem in successive relaying systems.First inter-relay interference between trusted relay and untrusted relay was exploited as artificial
Yi ZOU, Kai-zhi HUANG, Xiao-lei KANG
doaj +2 more sources
Secure two-way communication via a wireless powered untrusted relay and friendly jammer
In this paper, we propose a self-dependent two-way secure communication where two sources exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay and friendly jammer (FJ).
Kuhestani, Ali +3 more
core +1 more source
Quantum cryptography with an ideal local relay [PDF]
We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection.
Andersen, Ulrik L. +6 more
core +3 more sources
Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks
In this work, we maximize the secrecy rate of the wireless-powered untrusted relay network by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). Different
Feng, Suili +5 more
core +1 more source

