On the application of cooperative transmission to secrecy communications

Z Ding, KK Leung, DL Goeckel… - IEEE journal on selected …, 2012 - ieeexplore.ieee.org
Information theoretic security has recently emerged as an effective physical layer approach
to provide secure communications. The outage performance of such a secrecy …

Security enhancement of cooperative single carrier systems

L Wang, KJ Kim, TQ Duong… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, the impact of multiple active eavesdroppers on cooperative single carrier
systems with multiple relays and multiple destinations is examined. To achieve the secrecy …

On cooperative relaying schemes for wireless physical layer security

J Li, AP Petropulu, S Weber - IEEE transactions on signal …, 2011 - ieeexplore.ieee.org
We consider a cooperative wireless network in the presence of one or more eavesdroppers,
and exploit node cooperation for achieving physical (PHY) layer based security. Two …

Secure wireless communications via cooperation

L Dong, Z Han, AP Petropulu… - 2008 46th Annual …, 2008 - ieeexplore.ieee.org
The feasibility of physical-layer-based security approaches for wireless communications in
the presence of one or more eavesdroppers is hampered by channel conditions. In this …

Secrecy transmission with a helper: To relay or to jam

H Deng, HM Wang, W Guo… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we consider the problem of secure communications for a four-node system
consisting of one source, one destination, one eavesdropper, and one helper. We …

Physical-layer security in the finite blocklength regime over fading channels

TX Zheng, HM Wang, DWK Ng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper studies physical-layer secure transmissions from a transmitter to a legitimate
receiver against an eavesdropper over slow fading channels, taking into account the impact …

Cooperative secure transmission relying on optimal power allocation in the presence of untrusted relays, a passive eavesdropper and hardware impairments

M Moradikia, H Bastami, A Kuhestani, H Behroozi… - IEEE …, 2019 - ieeexplore.ieee.org
In this work, by considering a variety of realistic hardware impairments, we aim to enhance
the security of a cooperative relaying network, where a source intends to transmit its …

Enhancing security in correlated channel with maximal ratio combining diversity

MZI Sarkar, T Ratnarajah - IEEE transactions on signal …, 2012 - ieeexplore.ieee.org
In this correspondence, we consider a confidential communication through slow non-
selective correlated Rayleigh fading channel, where a single antenna transmitter …

Cooperative-jamming-aided secrecy enhancement in wireless networks with passive eavesdroppers

L Hu, H Wen, B Wu, J Tang, F Pan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper investigates cooperative security in wireless networks, where a source (Alice)
intends to transmit a confidential message to a legitimate destination (Bob), with the help of …

Adaptive secure transmission for physical layer security in cooperative wireless networks

L Hu, H Wen, B Wu, J Tang… - IEEE Communications …, 2016 - ieeexplore.ieee.org
We investigate the physical layer security in cooperative wireless networks where a source
(Alice) transmits a confidential message to a destination (Bob) with the help of a cooperative …