Results 31 to 40 of about 3,690 (182)

Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]

open access: yes, 2017
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin   +5 more
core   +3 more sources

On the Secrecy Performance and Power Allocation in Relaying Networks With Untrusted Relay in the Partial Secrecy Regime [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2020
Recently, three useful secrecy metrics based on the partial secrecy regime were proposed to analyze secure transmissions on wireless systems over quasi-static fading channels, namely: generalized secrecy outage probability, average fractional equivocation, and average information leakage.
Diana Pamela Moya Osorio   +2 more
openaire   +4 more sources

Channel Phase Based Secret Key Generation: Untrusted Relaying or Not? [PDF]

open access: yesAUT Journal of Modeling and Simulation
Compared to traditional cryptography methods, physical layer secret key generation (PLSKG) can be more efficient and well-suited for Internet-of-Things (IoT) owing to its lightweight nature and scalability.
Mohammadreza Keshavarzi   +3 more
doaj   +1 more source

Subcarrier‐pair based joint resource allocation for secure cooperative OFDM system with multiple untrusted AF relays

open access: yesIET Communications, 2022
In this paper, a cooperative orthogonal frequency division multiplexing system with multiple untrusted amplify‐and‐forward relays is considered. Since there exists no direct link between source and user because of the shadowing effect, a positive system ...
Yifeng Jin   +4 more
doaj   +1 more source

Measurement-device-independent quantum key distribution over untrustful metropolitan network [PDF]

open access: yes, 2015
Quantum cryptography holds the promise to establish an information-theoretically secure global network. All field tests of metropolitan-scale quantum networks to date are based on trusted relays.
Chen, Si-Jing   +17 more
core   +3 more sources

Securing Relay Networks with Artificial Noise: An Error Performance-Based Approach

open access: yesEntropy, 2017
We apply the concept of artificial and controlled interference in a two-hop relay network with an untrusted relay, aiming at enhancing the wireless communication secrecy between the source and the destination node.
Ying Liu   +3 more
doaj   +1 more source

Successive relaying secure transmission scheme based on inter-relay interference cancellation

open access: yesTongxin xuebao, 2017
A secure scheme based on inter-relay interference cancellation was proposed to solve untrusted relay eavesdropping problem in successive relaying systems.First inter-relay interference between trusted relay and untrusted relay was exploited as artificial
Yi ZOU, Kai-zhi HUANG, Xiao-lei KANG
doaj   +2 more sources

Secure two-way communication via a wireless powered untrusted relay and friendly jammer

open access: yes, 2017
In this paper, we propose a self-dependent two-way secure communication where two sources exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay and friendly jammer (FJ).
Kuhestani, Ali   +3 more
core   +1 more source

Quantum cryptography with an ideal local relay [PDF]

open access: yes, 2015
We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection.
Andersen, Ulrik L.   +6 more
core   +3 more sources

Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks

open access: yes, 2015
In this work, we maximize the secrecy rate of the wireless-powered untrusted relay network by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). Different
Feng, Suili   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy