A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Can a Multi-Hop Link Relying on Untrusted Amplify-and-Forward Relays Render Security?
[article]
2020
arXiv
pre-print
For the sake of analysis, we consider a multi-hop untrusted relaying network with two successive intermediate nodes, i.e, a three-hop communications network. ...
, i.e., we may face with the untrusted relaying scenario where the relays are both necessary helpers and potential adversary. ...
transmission in a multi-hop AF untrusted relaying network. ...
arXiv:1905.09384v2
fatcat:qihwlha2hbbsvoc5brlmrcua3u
Joint transmit design and node selection for one-way and two-way untrusted relay channels
2013
2013 Asilomar Conference on Signals, Systems and Computers
We investigate a relay network where the source and destination select one relay out of a group of untrusted relay nodes to establish a reliable and confidential connection. ...
We study joint transmit design and node selection strategies for both one-way relaying with the help of cooperative jamming from the destination, and two-way relaying. ...
CONCLUSIONS This paper studied joint transmit design and relay node selection for a relay network with a group of untrusted relay nodes. ...
doi:10.1109/acssc.2013.6810558
dblp:conf/acssc/HuangS13
fatcat:jf4vxk7cprc3ndkahn5fck54bi
General Secure Information Exchange Protocol for a Multiuser MIMO Relay Channel
2019
Entropy
Secure information exchange occurs in many recently emerging cooperative-based networks, such as 5G networks (especially those with a Device to Device architecture), the Internet of Things, and vehicular ...
Third, we conduct secrecy sum-rate analysis for three attack scenarios: an untrusted relay attack only, an eavesdropper attack only, and both an untrusted relay and eavesdropper attack. ...
A method that combined jamming and relay selection was proposed in [18] to prevent untrusted relays in a two-hop cooperative network. ...
doi:10.3390/e21111054
fatcat:ouxmxqzrz5be3ksuhvtycbs4jm
Relaying in the Internet of Things (IoT): A Survey
2021
IEEE Access
The approach requires the acquisition of the CSI between nodes in the IoT network. Methods to select the source device are also proposed for an IoT network having an untrusted AF relay in D. ...
Physical layer security has been proposed to ensure that malicious eavesdroppers and untrusted relay nodes do not compromise the network. ...
doi:10.1109/access.2021.3112940
fatcat:beo5j6hyd5hwhlxj4mp5vok4sq
Secure transmission with covert requirement in untrusted relaying networks
[article]
2018
arXiv
pre-print
In this paper, we study the problem of secure transmission with covert requirement in untrusted relaying networks. ...
Our findings highlight that unlike the direct transmission scheme, the achievable secrecy rate of the proposed secure transmission scheme improve as the number of untrusted relays increases. ...
1 : 1 Secure transmission in untrusted relaying network with covert requirement. ...
arXiv:1809.00312v1
fatcat:j7zhlvmbg5alto4t6rcz3b62lm
Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios
2019
IEEE Transactions on Information Forensics and Security
For the second scenario, with the untrusted relay, achievable secrecy rate regions are derived for two different relaying schemes: compress-and-forward and amplify-and-forward, under two different modes ...
For the first scenario, a number of trusted cooperative half-duplex relays is employed to assist with the BS's transmission and secure its signals from the external eavesdropper. ...
, for which we use trusted cooperative relays to enhance security, and the second is when communication occurs through an untrusted relay node. ...
doi:10.1109/tifs.2019.2911162
fatcat:vsogixf74vhahciso5zwslnfza
Physical layer security in an Untrusted Energy Harvesting Relay Network
2019
IEEE Access
The security performance in an amplify-and-forward dual-hop untrusted relay network is considered. ...
INDEX TERMS Untrusted relay, energy harvesting, multiple antennas, performance analysis, power splitting relaying, time switching relaying. ...
The works in [19] considered the secure transmission in the two-hop AF untrusted relay networks. ...
doi:10.1109/access.2019.2897357
fatcat:hndgjjrz4vhrvibdfidlp2telu
A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions
2018
Entropy
Communication security is critically important for the operations of IoT. ...
Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view, ...
In [53] , several relay selection policies were developed for successive AF relaying networks with untrusted nodes, where different complexity requirements were considered. ...
doi:10.3390/e20100730
pmid:33265819
pmcid:PMC7512293
fatcat:fd43pygkejdflckeeijhiwfrl4
Non-Orthogonal Multiple Access For Cooperative Communications: Challenges, Opportunities, And Trends
[article]
2018
arXiv
pre-print
Non-orthogonal multiple access (NOMA) is a promising radio access technique for next-generation wireless networks. In this article, we investigate the NOMA-based cooperative relay network. ...
Finally, major challenges, opportunities, and future research trends for the design of NOMA-based cooperative relay systems with other techniques are also highlighted to provide insights for researchers ...
, how to place or select the optimal relay nodes for the network will become very important. ...
arXiv:1801.04650v1
fatcat:ufreal5ptbcvnjcpwlj7ypmtga
Secrecy performance of a multi-NOMA-MIMO system in the UEH relaying network using the PSO algorithm
2020
IEEE Access
In this network, a source communicates with users with the help of a relaying network composed of multiple untrusted components using the amplify-and-forward (AF) protocol. ...
These untrusted relay nodes are equipped with a single antenna and employ the power-splitting (PS) protocol to harvest energy from received signals. ...
Some researchers have considered the secrecy performance for cooperative systems with an untrusted relaying network in which the relay nodes act as both helpers that assist the transmission from the source ...
doi:10.1109/access.2020.3047674
fatcat:h42nbxte5vet7fk36g6wlabnaa
Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
[article]
2021
arXiv
pre-print
This paper investigates the physical layer security design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve). ...
relay nodes and Eve. ...
In other words, the impact of N E is dominant as compared with the number of untrusted relay nodes. The reason for this is that increasing N E results in purely degrading the security. ...
arXiv:2101.02749v1
fatcat:fm7y5jnmtzfkrlcempg2xomkx4
Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network
2015
International Journal of Antennas and Propagation
The secure communication that multiple OFDMA-based cell-edge mobile stations (MS) can only transmit confidential messages to base station (BS) through an untrusted intermediate relay (UR) is discussed. ...
These algorithms alternatively solve the subproblem of joint BS and UR power allocation and the subproblem of MS selection until system sum secrecy rate is nonincreasing. ...
Acknowledgment This work was supported by Fundamental Research Funds for the Central Universities (CDJXS11162236). ...
doi:10.1155/2015/530632
fatcat:3mcwgekm7faefp4cftnytmoeda
NOMA in Cooperative Communication Systems with Energy-Harvesting Nodes and Wireless Secure Transmission
2020
IEEE Transactions on Wireless Communications
For the untrusted relay scenario, new analytical expression for the average secrecy rate is derived. Monte Carlo simulations are provided to validate the analysis. ...
antennas relay node. ...
In Section V, new analytical expressions are derived for the average secrecy rate when the relay is an untrusted node. ...
doi:10.1109/twc.2020.3030133
fatcat:fs7fahusd5hh5lq775hroqbgda
Relay selection for wireless communications against eavesdropping: a security-reliability trade-off perspective
2016
IEEE Network
Additionally, we present some open challenges and future directions for the wireless relay aided physical-layer security. ...
We first demonstrate that the employment of relay nodes for assisting the source-destination transmissions is capable of defending against eavesdropping, followed by quantifying the benefits of single-relay ...
Although physical-layer network coding improves the security level, an untrusted relay can still decode its composite signal by using successive interference cancellation techniques. ...
doi:10.1109/mnet.2016.7579030
fatcat:h5endjihp5co5fouekbvdq4dbm
Joint Resource Allocation in Secure OFDM Two-Way Untrusted Relay System
2022
Sensors
In this paper, we consider joint secure resource allocation for a two-way cooperative OFDM system with an untrusted relay. ...
In the orthogonal frequency division multiplexing (OFDM) relay system, when the relay is untrusted, the security of the system faces serious threats. ...
In [18] , the authors studied secure relay selection for two-way untrusted relaying networks. ...
doi:10.3390/s22062398
pmid:35336569
pmcid:PMC8953278
fatcat:rb6nedr2o5d3djyswc3xy4xwd4
« Previous
Showing results 1 — 15 out of 164 results