Secrecy performance analysis for fixed-gain energy harvesting in an Internet of Things with untrusted relays

DD Tran, C So-In, H Tran - IEEE Access, 2018 - ieeexplore.ieee.org
… In this section, recent works about PLS analysis in IoT with untrusted relays are presented.
To enhance secrecy performance, some works have investigated the PLS for IoT [9], [20], [26]–…

Link adaptation with untrusted relay assignment: Design and performance analysis

H Khodakarami, F Lahouti - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
… In this paper, a link adaptation and untrusted relay assignment framework for cooperative …
of untrusted relays. The security constraint is imposed by ensuring that the relays cannot …

On the secrecy performance and power allocation in relaying networks with untrusted relay in the partial secrecy regime

DPM Osorio, H Alves, EEB Olivo - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… -node AF relaying network where the relay is untrusted and a … works, we analyze the
secrecy performance in terms of the … policies among the source, relay, and destination. The …

Security and reliability performance analysis for two‐way wireless energy harvesting based untrusted relaying with cooperative jamming

MT Mamaghani, R Abbas - IET Communications, 2019 - Wiley Online Library
… the security and the reliability performance of a two-way relay-based network, where a …
-powered untrusted amplify-and-forward relay while employing a friendly jammer. The relay

Physical layer security in an untrusted energy harvesting relay network

H Shi, Y Cai, D Chen, J Hu, W Yang, W Yang - IEEE Access, 2019 - ieeexplore.ieee.org
performance in an untrusted EH relay network, which consists of a source, multiple destinations,
and one untrusted relay. To … So-In, and DB Ha, “Secrecy performance analysis of energy …

Reliability and security performance analysis of non-regenerative untrusted relay networks

D Chen, L Wang, T Yin, X Xu, W Yang… - … & Signal Processing …, 2015 - ieeexplore.ieee.org
… This paper has analyzed a three-node non-regenerative untrusted relay network, where
the relay is a potential eavesdropper despite its assisting the source with cooperative …

Security-aware relaying scheme for cooperative networks with untrusted relay nodes

L Sun, P Ren, Q Du, Y Wang… - IEEE Communications …, 2014 - ieeexplore.ieee.org
… from being eavesdropped by the untrusted relays. To evaluate the performance of the
proposed … To prevent the source message from being eavesdropped at the untrusted relays, we …

On security and throughput for energy harvesting untrusted relays in IoT systems using NOMA

C So-In, H Tran, DD Tran, S Heng… - IEEE …, 2019 - ieeexplore.ieee.org
… To analyze the secrecy performance, we investigate three schemes: random-BS-best-…
untrusted relay, and the authors did not investigate the impact of EH on the secrecy performance of …

Design and performance analysis of secure multicasting cooperative protocol for wireless sensor network applications

M Atallah, G Kaddoum - IEEE Wireless Communications …, 2019 - ieeexplore.ieee.org
… authors studied the secrecy capacity scaling with aggressive untrusted relays. We define
the aggressive behavior as when the untrusted relays are cooperating between each other by …

Performance analysis of energy harvesting NOMA systems with IOT relay selection and untrusted user presence

NK Largani, B Akhbari - 2020 28th Iranian Conference on …, 2020 - ieeexplore.ieee.org
… role of an untrusted user and wants to eavesdrop the IOT relay message. We evaluate the
impact of relay selection and the presence of untrusted user on the performance of the system …