Impact of outdated CSI on the secure communication in untrusted in-band full-duplex relay networks

JT Lim, T Kim, I Bang - IEEE Access, 2022 - ieeexplore.ieee.org
To provide reliable connectivity in recent and future wireless communication systems, it is
necessary to deploy several relay nodes. Further, a full-duplex (FD) technique has been in …

Security of full-duplex jamming SWIPT system with multiple non-colluding eavesdroppers

X xuan Tang, W Yang, Y Cai, W Yang… - 2017 7th IEEE …, 2017 - ieeexplore.ieee.org
In this paper, the secrecy performance of full-duplex jamming SWIPT system is conducted
where multiple eavesdroppers intercept the confidential information individually. The closed …

Energy-constrained SWIPT networks: Enhancing physical layer security with FD self-jamming

X Tang, Y Cai, Y Deng, Y Huang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of energy-constrained wireless-
powered networks with considering the passive eavesdropping scenario, where the …

Physical-layer security in full-duplex multi-hop multi-user wireless network with relay selection

S Atapattu, N Ross, Y Jing, Y He… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper investigates the relay selection (RS) problem for multi-hop full-duplex relay
networks where multiple source-destination (SD) pairs compete for the same pool of relays …

Secrecy performance analysis of artificial noise aided precoding in full-duplex relay systems

Y Li, R Zhao, X Tan, Z Nie - GLOBECOM 2017-2017 IEEE …, 2017 - ieeexplore.ieee.org
In Rayleigh fading channels, we investigate the secrecy performance of a full-duplex relay
secure transmission system. To improve the secrecy capacity of the system and efficiently …

Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks

D Goeckel, S Vasudevan, D Towsley… - IEEE Journal on …, 2011 - ieeexplore.ieee.org
The secure transmission of information in wireless networks without knowledge of
eavesdropper channels or locations is considered. Two key mechanisms are employed …

Safeguarding multiuser communication using full-duplex jamming receivers

X Qiu, T Jiang - … IEEE 28th Annual International Symposium on …, 2017 - ieeexplore.ieee.org
In this paper, we consider secure communications in a multiuser wireless network, where full-
duplex (FD) users operate to enhance wireless physical layer security. Under these …

Impact of Relay's Eavesdropping on Untrusted Amplify-and-Forward Networks Over Nakagami- Fading

F Ding, H Wang, Y Zhou… - IEEE Wireless …, 2017 - ieeexplore.ieee.org
We investigate the impact of eavesdropping on the secrecy outage performance of dual-hop
amplify-and-forward networks with a single untrusted relay, in which cooperative jamming …

Optimal power allocation by imperfect hardware analysis in untrusted relaying networks

A Kuhestani, A Mohammadi, KK Wong… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
By taking a variety of realistic hardware imperfections into consideration, we propose an
optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a …

Improving physical layer security of cellular networks using full-duplex jamming relay-aided D2D communications

MH Khoshafa, TMN Ngatched, MH Ahmed… - IEEE …, 2020 - ieeexplore.ieee.org
This paper investigates the physical layer security and data transmission in cellular networks
with inband underlay Device-to-Device (D2D) communications, where there is no direct link …