[PDF][PDF] Two-hop secure communication using an untrusted relay

X He, A Yener - EURASIP Journal on Wireless Communications and …, 2009 - Springer
… can only communicate through an untrusted intermediate relayrelaying scheme to facilitate
reliable communication between the source and the destination. Yet, the information it relays

Two-hop secure communication using an untrusted relay: A case for cooperative jamming

X He, A Yener - IEEE GLOBECOM 2008-2008 IEEE Global …, 2008 - ieeexplore.ieee.org
secure communication to take place using an untrusted relay … a relay network without a
direct link, where relaying is … to communicate despite the fact that the relay node is untrusted. …

Secure communication via a wireless energy harvesting untrusted relay

SS Kalamkar, A Banerjee - IEEE Transactions on Vehicular …, 2016 - ieeexplore.ieee.org
secure communication between a source and a destination via a wireless energy harvesting
untrusted node that acts as a helper to relay … information confidential from the relay node. To …

Secure communication via an untrusted non-regenerative relay in fading channels

J Huang, A Mukherjee… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
… a scenario where the untrusted relay must perform antenna selection for receive and transmit,
rather than beamforming. In particular, we assume the untrusted relay chooses the receive …

End-to-end secure multi-hop communication with untrusted relays

X He, A Yener - IEEE transactions on wireless communications, 2012 - ieeexplore.ieee.org
… We show that, in this network, secure communication is … through the route using these
untrusted nodes. Furthermore, we … no matter how many eavesdropping relays are present, and …

The role of an untrusted relay in secret communication

X He, A Yener - 2008 IEEE International Symposium on …, 2008 - ieeexplore.ieee.org
… secret from a relay node despite wanting to enlist its help. A class of relay channels with …
For the class of relay channels in consideration, we prove the relay and the eavesdropper …

Cooperation with an untrusted relay: A secrecy perspective

X He, A Yener - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
communications. We consider the three node relay network, where the relay has a lower
security clearance than the destination and is therefore untrusted. Reference [20], the first work …

Security-aware relaying scheme for cooperative networks with untrusted relay nodes

L Sun, P Ren, Q Du, Y Wang… - IEEE Communications …, 2014 - ieeexplore.ieee.org
… To prevent the source message from being eavesdropped at the untrusted relays, we
propose to use an alternate jamming method, whose details are given as follows. During the 1st …

Relay selection for secure successive AF relaying networks with untrusted nodes

W Wang, KC Teh, KH Li - … on Information Forensics and Security, 2016 - ieeexplore.ieee.org
… , the security aspect of an amplifyand-forward (AF) relaying network with untrusted relay nodes
… • We propose to use the successive relaying scheme to secure an AF relay network with …

Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach

L Lv, F Zhou, J Chen, N Al-Dhahir - … Forensics and Security, 2019 - ieeexplore.ieee.org
… In these scenarios, despite enjoying the benefit of relay cooperation, the … kept secure against
the untrusted relay. The design of secure cooperative communications with untrusted relays