Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








164 Hits in 4.7 sec

Can a Multi-Hop Link Relying on Untrusted Amplify-and-Forward Relays Render Security? [article]

Milad Tatar Mamaghani, Ali Kuhestani, Hamid Behroozi
2020 arXiv   pre-print
For the sake of analysis, we consider a multi-hop untrusted relaying network with two successive intermediate nodes, i.e, a three-hop communications network.  ...  , i.e., we may face with the untrusted relaying scenario where the relays are both necessary helpers and potential adversary.  ...  transmission in a multi-hop AF untrusted relaying network.  ... 
arXiv:1905.09384v2 fatcat:qihwlha2hbbsvoc5brlmrcua3u

Joint transmit design and node selection for one-way and two-way untrusted relay channels

Jing Huang, A. Lee Swindlehurst
2013 2013 Asilomar Conference on Signals, Systems and Computers  
We investigate a relay network where the source and destination select one relay out of a group of untrusted relay nodes to establish a reliable and confidential connection.  ...  We study joint transmit design and node selection strategies for both one-way relaying with the help of cooperative jamming from the destination, and two-way relaying.  ...  CONCLUSIONS This paper studied joint transmit design and relay node selection for a relay network with a group of untrusted relay nodes.  ... 
doi:10.1109/acssc.2013.6810558 dblp:conf/acssc/HuangS13 fatcat:jf4vxk7cprc3ndkahn5fck54bi

General Secure Information Exchange Protocol for a Multiuser MIMO Relay Channel

Qiao Liu, Hui Li, Yong Wang
2019 Entropy  
Secure information exchange occurs in many recently emerging cooperative-based networks, such as 5G networks (especially those with a Device to Device architecture), the Internet of Things, and vehicular  ...  Third, we conduct secrecy sum-rate analysis for three attack scenarios: an untrusted relay attack only, an eavesdropper attack only, and both an untrusted relay and eavesdropper attack.  ...  A method that combined jamming and relay selection was proposed in [18] to prevent untrusted relays in a two-hop cooperative network.  ... 
doi:10.3390/e21111054 fatcat:ouxmxqzrz5be3ksuhvtycbs4jm

Relaying in the Internet of Things (IoT): A Survey

Uyoata Uyoata, Joyce Mwangama, Ramoni Adeogun
2021 IEEE Access  
The approach requires the acquisition of the CSI between nodes in the IoT network. Methods to select the source device are also proposed for an IoT network having an untrusted AF relay in D.  ...  Physical layer security has been proposed to ensure that malicious eavesdroppers and untrusted relay nodes do not compromise the network.  ... 
doi:10.1109/access.2021.3112940 fatcat:beo5j6hyd5hwhlxj4mp5vok4sq

Secure transmission with covert requirement in untrusted relaying networks [article]

Moslem Forouzesh, Paeiz Azmi, Ali Kuhestani
2018 arXiv   pre-print
In this paper, we study the problem of secure transmission with covert requirement in untrusted relaying networks.  ...  Our findings highlight that unlike the direct transmission scheme, the achievable secrecy rate of the proposed secure transmission scheme improve as the number of untrusted relays increases.  ...  1 : 1 Secure transmission in untrusted relaying network with covert requirement.  ... 
arXiv:1809.00312v1 fatcat:j7zhlvmbg5alto4t6rcz3b62lm

Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios

Ahmed Arafa, Wonjae Shin, Mojtaba Vaezi, H. Vincent Poor
2019 IEEE Transactions on Information Forensics and Security  
For the second scenario, with the untrusted relay, achievable secrecy rate regions are derived for two different relaying schemes: compress-and-forward and amplify-and-forward, under two different modes  ...  For the first scenario, a number of trusted cooperative half-duplex relays is employed to assist with the BS's transmission and secure its signals from the external eavesdropper.  ...  , for which we use trusted cooperative relays to enhance security, and the second is when communication occurs through an untrusted relay node.  ... 
doi:10.1109/tifs.2019.2911162 fatcat:vsogixf74vhahciso5zwslnfza

Physical layer security in an Untrusted Energy Harvesting Relay Network

Hui Shi, Yueming Cai, Dechuan Chen, Jianwei Hu, Weiwei Yang, Wendong yang
2019 IEEE Access  
The security performance in an amplify-and-forward dual-hop untrusted relay network is considered.  ...  INDEX TERMS Untrusted relay, energy harvesting, multiple antennas, performance analysis, power splitting relaying, time switching relaying.  ...  The works in [19] considered the secure transmission in the two-hop AF untrusted relay networks.  ... 
doi:10.1109/access.2019.2897357 fatcat:hndgjjrz4vhrvibdfidlp2telu

A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions

Li Sun, Qinghe Du
2018 Entropy  
Communication security is critically important for the operations of IoT.  ...  Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view,  ...  In [53] , several relay selection policies were developed for successive AF relaying networks with untrusted nodes, where different complexity requirements were considered.  ... 
doi:10.3390/e20100730 pmid:33265819 pmcid:PMC7512293 fatcat:fd43pygkejdflckeeijhiwfrl4

Non-Orthogonal Multiple Access For Cooperative Communications: Challenges, Opportunities, And Trends [article]

Dehuan Wan, Miaowen Wen, Fei Ji, Hua Yu, Fangjiong Chen
2018 arXiv   pre-print
Non-orthogonal multiple access (NOMA) is a promising radio access technique for next-generation wireless networks. In this article, we investigate the NOMA-based cooperative relay network.  ...  Finally, major challenges, opportunities, and future research trends for the design of NOMA-based cooperative relay systems with other techniques are also highlighted to provide insights for researchers  ...  , how to place or select the optimal relay nodes for the network will become very important.  ... 
arXiv:1801.04650v1 fatcat:ufreal5ptbcvnjcpwlj7ypmtga

Secrecy performance of a multi-NOMA-MIMO system in the UEH relaying network using the PSO algorithm

Le Thi Anh, Ic Pyo Hong
2020 IEEE Access  
In this network, a source communicates with users with the help of a relaying network composed of multiple untrusted components using the amplify-and-forward (AF) protocol.  ...  These untrusted relay nodes are equipped with a single antenna and employ the power-splitting (PS) protocol to harvest energy from received signals.  ...  Some researchers have considered the secrecy performance for cooperative systems with an untrusted relaying network in which the relay nodes act as both helpers that assist the transmission from the source  ... 
doi:10.1109/access.2020.3047674 fatcat:h42nbxte5vet7fk36g6wlabnaa

Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning [article]

Hamed Bastami, Majid Moradikia, Hamid Behroozi, Rodrigo C. de Lamare, Ahmed Abdelhadi, Zhigou Ding
2021 arXiv   pre-print
This paper investigates the physical layer security design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve).  ...  relay nodes and Eve.  ...  In other words, the impact of N E is dominant as compared with the number of untrusted relay nodes. The reason for this is that increasing N E results in purely degrading the security.  ... 
arXiv:2101.02749v1 fatcat:fm7y5jnmtzfkrlcempg2xomkx4

Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network

Weiheng Jiang, Wenjiang Feng
2015 International Journal of Antennas and Propagation  
The secure communication that multiple OFDMA-based cell-edge mobile stations (MS) can only transmit confidential messages to base station (BS) through an untrusted intermediate relay (UR) is discussed.  ...  These algorithms alternatively solve the subproblem of joint BS and UR power allocation and the subproblem of MS selection until system sum secrecy rate is nonincreasing.  ...  Acknowledgment This work was supported by Fundamental Research Funds for the Central Universities (CDJXS11162236).  ... 
doi:10.1155/2015/530632 fatcat:3mcwgekm7faefp4cftnytmoeda

NOMA in Cooperative Communication Systems with Energy-Harvesting Nodes and Wireless Secure Transmission

Abdelhamid Salem, Leila Musavian
2020 IEEE Transactions on Wireless Communications  
For the untrusted relay scenario, new analytical expression for the average secrecy rate is derived. Monte Carlo simulations are provided to validate the analysis.  ...  antennas relay node.  ...  In Section V, new analytical expressions are derived for the average secrecy rate when the relay is an untrusted node.  ... 
doi:10.1109/twc.2020.3030133 fatcat:fs7fahusd5hh5lq775hroqbgda

Relay selection for wireless communications against eavesdropping: a security-reliability trade-off perspective

Yulong Zou, Jia Zhu, Xuelong Li, Lajos Hanzo
2016 IEEE Network  
Additionally, we present some open challenges and future directions for the wireless relay aided physical-layer security.  ...  We first demonstrate that the employment of relay nodes for assisting the source-destination transmissions is capable of defending against eavesdropping, followed by quantifying the benefits of single-relay  ...  Although physical-layer network coding improves the security level, an untrusted relay can still decode its composite signal by using successive interference cancellation techniques.  ... 
doi:10.1109/mnet.2016.7579030 fatcat:h5endjihp5co5fouekbvdq4dbm

Joint Resource Allocation in Secure OFDM Two-Way Untrusted Relay System

Yifeng Jin, Xunan Li, Guocheng Lv, Meihui Zhao, Ye Jin
2022 Sensors  
In this paper, we consider joint secure resource allocation for a two-way cooperative OFDM system with an untrusted relay.  ...  In the orthogonal frequency division multiplexing (OFDM) relay system, when the relay is untrusted, the security of the system faces serious threats.  ...  In [18] , the authors studied secure relay selection for two-way untrusted relaying networks.  ... 
doi:10.3390/s22062398 pmid:35336569 pmcid:PMC8953278 fatcat:rb6nedr2o5d3djyswc3xy4xwd4
« Previous Showing results 1 — 15 out of 164 results