Improving wireless secrecy rate via full-duplex relay-assisted protocols

S Parsaeefard, T Le-Ngoc - IEEE transactions on information …, 2015 - ieeexplore.ieee.org
In this paper, we examine the use of a friendly full-duplex (FD) relay to increase the secrecy
rate over a fading channel between the legitimate source and the destination in the …

Physical-layer security in full-duplex multi-hop multi-user wireless network with relay selection

S Atapattu, N Ross, Y Jing, Y He… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper investigates the relay selection (RS) problem for multi-hop full-duplex relay
networks where multiple source-destination (SD) pairs compete for the same pool of relays …

Physical-layer security with full-duplex transceivers and multiuser receiver at eve

NH Mahmood, IS Ansari, P Popovski… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Full-duplex communication enables simultaneous transmission from both ends of a
communication link, thereby promising significant performance gains. Generally, it has been …

Robust joint beamforming and jamming for secure AF networks: Low-complexity design

C Wang, HM Wang - IEEE Transactions on Vehicular …, 2014 - ieeexplore.ieee.org
This paper investigates the physical-layer security issue of an amplify-and-forward (AF) relay
network. We propose a joint cooperative beamforming (CB) and cooperative jamming (CJ) …

Artificial-noise-aided optimal beamforming in layered physical layer security

W Zhang, J Chen, Y Kuo, Y Zhou - IEEE Communications …, 2018 - ieeexplore.ieee.org
In this letter, we develop a novel layered physical layer security model to secure multiple
messages simultaneously. It maintains a hierarchical security structure, in which each …

Artificial-noise-aided secure MIMO full-duplex relay channels with fixed-power transmissions

A El Shafie, D Niyato… - IEEE Communications …, 2016 - ieeexplore.ieee.org
This letter studies the physical-layer security of a full-duplex (FD) multiple-input multiple-
output relay channel. A legitimate source node (Alice) communicates with her destination …

Half-duplex active eavesdropping in fast-fading channels: A block-Markov Wyner secrecy encoding scheme

GT Amariucai, S Wei - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
In this paper, we study the problem of half-duplex active eavesdropping in fast-fading
channels. The active eavesdropper is a more powerful adversary than the classical …

Enhanced secrecy performance of multihop IoT networks with cooperative hybrid-duplex jamming

Z Abdullah, G Chen, MAM Abdullah… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
As the number of connected devices is exponentially increasing, security in Internet of
Things (IoT) networks presents a major challenge. Accordingly, in this work we investigate …

Physical-layer security for proximal legitimate user and eavesdropper: A frequency diverse array beamforming approach

J Lin, Q Li, J Yang, H Shao… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Transmit beamforming and artificial noise-based methods have been widely employed to
achieve physical-layer (PHY) security. However, these approaches may fail to provide …

Secure relaying in non-orthogonal multiple access: Trusted and untrusted scenarios

A Arafa, W Shin, M Vaezi… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A downlink single-input single-output non-orthogonal multiple access setting is considered,
in which a base station (BS) is communicating with two legitimate users in two possible …