[PDF][PDF] Two-hop secure communication using an untrusted relay

X He, A Yener - EURASIP Journal on Wireless Communications and …, 2009 - Springer
two-hop communication scenario, we shall consider each node to be half-duplex, which leads
to a two-phase communication … be the enabler of secure communication. By recruiting the …

Two-hop secure communication using an untrusted relay: A case for cooperative jamming

X He, A Yener - IEEE GLOBECOM 2008-2008 IEEE Global …, 2008 - ieeexplore.ieee.org
… In this two-hop communication scenario, where the cooperation from the relay node is …
In essence, this paper shows that a cooperative jammer enables secure communication to …

Cooperative secure communication in two-hop buffer-aided networks

D Wang, P Ren, J Cheng - … Transactions on Communications, 2017 - ieeexplore.ieee.org
secure transmission assisted by a buffer-aided energy harvesting relay. Therefore, to answer
the above questions, we study secure transmission in a two-hop … problem for two cases. In …

Buffer-aided relaying for two-hop secure communication

J Huang, AL Swindlehurst - … on Wireless Communications, 2014 - ieeexplore.ieee.org
… We consider a half-duplex two-hop relaying network composed of a source (Alice), a destination
(… In order to focus on the impact of link selection policies on the security performance, we …

Secure consensus with distributed detection via two-hop communication

L Yuan, H Ishii - Automatica, 2021 - Elsevier
two-hop communication has long been studied in fault-tolerant algorithms in computer science.
We propose two … requirements on resources for communication and the structures of the …

Adaptive wireless-powered relaying schemes with cooperative jamming for two-hop secure communication

K Lee, JP Hong, HH Choi… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
secure two-hop relay … two wireless-powered two-hop relaying schemes for improving
secrecy capacity in the presence of an eavesdropper. The proposed schemes are based on two

Buffer-aided two-hop secure communications with power control and link selection

J Wan, D Qiao, HM Wang, H Qian - … Wireless Communications, 2018 - ieeexplore.ieee.org
… We consider a half-duplex two-hop secure communication link as depicted in Fig. 1. In this
model, source S wishes to send information to the destination D securely with the help of a …

And then there were more: Secure communication for more than two parties

D Naylor, R Li, C Gkantsidis, T Karagiannis… - Proceedings of the 13th …, 2017 - dl.acm.org
… (partial P1A ), the communication is forward secret if a forward secure cipher suite is used …
was designed for two parties P4 ; (2) the same key is used for encryption on each “hop” in the …

Secure communications via cooperative jamming in two-hop relay systems

J Huang, AL Swindlehurst - 2010 IEEE Global …, 2010 - ieeexplore.ieee.org
… We consider a two-hop four-terminal … both hops. The key idea is that Alice and Bob can
help form a cooperative jamming system without the addition of extra helpers outside the two-hop

Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach

S Zhu, S Xu, S Setia, S Jajodia - 11th IEEE International …, 2003 - ieeexplore.ieee.org
… We show that a pairwise key established between two nodes using our protocol is secure
For example, for nodes that are one hop or two hops away, they can find multiple disjoint …