R Zhao, X Tan, DH Chen, YC He… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
To improve the secrecy performance of the untrusted relay system with a multiple-antenna destination, a novel full-duplex destination jamming scheme with optimal antenna selection …
TM Hoang, BC Nguyen, N Van Vinh, GT Luu - Computer Networks, 2023 - Elsevier
This paper analyzes the secrecy attributes of a full-duplex relay (FDR) non-orthogonal multiple access (NOMA) system, where the best relay is chosen from a set of numerous …
B Zhong, Z Zhang - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
The secrecy outage probability (SOP) of cooperative communication systems with optimal relay selection (ORS) scheme in the presence of an eavesdropper is investigated by …
We have considered a dual‐hop wireless network consisting of a decode‐and‐forward (DF) relay in presence of an eavesdropper. Relay can correctly decode and retransmit only if the …
JH Lee - IEEE communications letters, 2015 - ieeexplore.ieee.org
In this letter, we consider secure communications in multi-hop relaying systems, where full- duplex relays (FDRs) operate to enhance wireless physical layer security. Each FDR is …
Y Feng, Z Yang, S Yan - 2017 IEEE Globecom workshops (GC …, 2017 - ieeexplore.ieee.org
In this paper, we investigate an artificial-noise (AN) aided secure transmission for non- orthogonal multiple access (NOMA) full-duplex (FD) relay network. We propose a novel joint …
H Lei, H Luo, KH Park, IS Ansari, W Lei… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
In this work, we analyze the secrecy outage performance of a dual-hop relay system composed of multiple-input-multiple-output radio-frequency (RF) links and a free-space …
C Yu, HL Ko, X Peng, W Xie - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate the secrecy outage performance of a typical cooperative downlink non-orthogonal multiple access (NOMA) system over Nakagami-m fading channel …
SI Chu - IEEE Transactions on Vehicular Technology, 2018 - ieeexplore.ieee.org
This paper investigates the physical-layer security of the modify-and-forward (MF) protocol in multi-relay and multieavesdropper networks. Three relay selection critera are developed …