X He, A Yener - IEEE GLOBECOM 2008-2008 IEEE Global …, 2008 - ieeexplore.ieee.org
… In this two-hopcommunication scenario, where the cooperation from the relay node is … In essence, this paper shows that a cooperative jammer enables securecommunication to …
D Wang, P Ren, J Cheng - … Transactions on Communications, 2017 - ieeexplore.ieee.org
… secure transmission assisted by a buffer-aided energy harvesting relay. Therefore, to answer the above questions, we study secure transmission in a two-hop … problem for two cases. In …
… We consider a half-duplex two-hop relaying network composed of a source (Alice), a destination (… In order to focus on the impact of link selection policies on the security performance, we …
… two-hopcommunication has long been studied in fault-tolerant algorithms in computer science. We propose two … requirements on resources for communication and the structures of the …
K Lee, JP Hong, HH Choi… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
… securetwo-hop relay … two wireless-powered two-hop relaying schemes for improving secrecy capacity in the presence of an eavesdropper. The proposed schemes are based on two …
J Wan, D Qiao, HM Wang, H Qian - … Wireless Communications, 2018 - ieeexplore.ieee.org
… We consider a half-duplex two-hopsecurecommunication link as depicted in Fig. 1. In this model, source S wishes to send information to the destination D securely with the help of a …
… (partial P1A ), the communication is forward secret if a forward secure cipher suite is used … was designed for two parties P4 ; (2) the same key is used for encryption on each “hop” in the …
… We consider a two-hop four-terminal … both hops. The key idea is that Alice and Bob can help form a cooperative jamming system without the addition of extra helpers outside the two-hop …
… We show that a pairwise key established between two nodes using our protocol is secure … For example, for nodes that are one hop or twohops away, they can find multiple disjoint …