Secure transmission for multiuser relay networks

SI Kim, IM Kim, J Heo - IEEE Transactions on Wireless …, 2015 - ieeexplore.ieee.org
… conventional multiuser diversity achieves with no security requirement. To address this issue
and to effectively exploit the multiuser diversity for secure relay networks, in this paper, we …

Secure transmission with optimal power allocation in untrusted relay networks

L Wang, M Elkashlan, J Huang… - IEEE wireless …, 2014 - ieeexplore.ieee.org
… -hop relay network consisting of a source (Alice) and a destination (Bob) communicating via
an untrusted AF relay. … During the second phase, the relay forwards the signals to Bob. The …

Secure transmission in linear multihop relaying networks

J Yao, X Zhou, Y Liu, S Feng - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
… Then, for both OFT and NOFT schemes, we consider the secure transmission design to
maximize secure transmission throughput under the secrecy outage constraint. …

When does relay transmission give a more secure connection in wireless ad hoc networks?

C Cai, Y Cai, X Zhou, W Yang… - … Forensics and Security, 2014 - ieeexplore.ieee.org
… 1, we consider a relay network consisting of one source (S), several relays (Rl,l = 1, 2,...),
one destination (D), and several eavesdroppers (Ej, j = 1, 2,...). All the nodes are equiped with …

Secure transmission in cooperative relaying networks with multiple antennas

Y Huang, J Wang, C Zhong, TQ Duong… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
… antennas at the relay, we propose a heuristic twostage relay processing scheme to enhance
the security of a dual-hop relaying network. According to this scheme, the relay first uses …

Beamforming for cooperative secure transmission in cognitive two-way relay networks

Q Li, L Yang - … on Information Forensics and Security, 2019 - ieeexplore.ieee.org
… For CTWR networks, physical layer security is an important … for cooperative secure transmission
in CTWR networks, which … information security for PTs, we introduce the CT as the relay

Physical layer security in wireless cooperative relay networks: State of the art and beyond

LJ Rodriguez, NH Tran, TQ Duong… - IEEE …, 2015 - ieeexplore.ieee.org
… the development of PHY security issues in untrusted relay networks. Then important issues
… trusted relay networks are discussed. Following that we present a case study of AF relaying

Secure transmission in SWIPT-powered two-way untrusted relay networks

J Zhang, X Tao, H Wu, X Zhang - IEEE Access, 2018 - ieeexplore.ieee.org
… , we investigate the secure transmission in two-way untrusted amplify-andforward relay
networks with … Two secure SWIPT relaying strategies, namely secure power splitting (SPS) and …

Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens

M Forouzesh, P Azmi, A Kuhestani… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… sourcerelay-destination link. For secure transmission, our aim is to prevent the untrusted relay
… during the source-to-relay and relay-to-destination transmission phases, respectively. For …

Secure transmission in cellular multiuser two-way amplify-and-forward relay networks

MK Shukla, S Yadav, N Purohit - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
networks with opportunistic relay selection. In [35], [36], the authors have studied the PHYsecurity
of two-way AF relay networks with effective relaysecurity of two-way AF relay networks