L Wang, KJ Kim, TQ Duong… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, the impact of multiple active eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy …
J Li, AP Petropulu, S Weber - IEEE transactions on signal …, 2011 - ieeexplore.ieee.org
We consider a cooperative wireless network in the presence of one or more eavesdroppers, and exploit node cooperation for achieving physical (PHY) layer based security. Two …
The feasibility of physical-layer-based security approaches for wireless communications in the presence of one or more eavesdroppers is hampered by channel conditions. In this …
H Deng, HM Wang, W Guo… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we consider the problem of secure communications for a four-node system consisting of one source, one destination, one eavesdropper, and one helper. We …
This paper studies physical-layer secure transmissions from a transmitter to a legitimate receiver against an eavesdropper over slow fading channels, taking into account the impact …
In this work, by considering a variety of realistic hardware impairments, we aim to enhance the security of a cooperative relaying network, where a source intends to transmit its …
In this correspondence, we consider a confidential communication through slow non- selective correlated Rayleigh fading channel, where a single antenna transmitter …
L Hu, H Wen, B Wu, J Tang, F Pan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper investigates cooperative security in wireless networks, where a source (Alice) intends to transmit a confidential message to a legitimate destination (Bob), with the help of …
L Hu, H Wen, B Wu, J Tang… - IEEE Communications …, 2016 - ieeexplore.ieee.org
We investigate the physical layer security in cooperative wireless networks where a source (Alice) transmits a confidential message to a destination (Bob) with the help of a cooperative …