Secrecy-enhancing design for cooperative downlink and uplink NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… framework for cooperative downlink and uplink NOMA transmissions in the presence of
an untrusted relay, where a source uses the NOMA principle to have downlink and uplink …

Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach

L Lv, F Zhou, J Chen, N Al-Dhahir - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… We consider a downlink transmission with a single-antenna relay as shown in Fig. 1(a),
where a source (denoted as S) transmits confidential information to a destination (denoted as D) …

Cooperative privacy preserving scheme for downlink transmission in multiuser relay networks

H Xu, L Sun, P Ren, Q Du… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
downlink transmission in multiuser relay networks, where a source communicates with multiple
users via a relay … eavesdropping attacks, ie, the systems with untrusted relays [20]-[22]. In […

Secure and energy-efficient precoding for MIMO two-way untrusted relay systems

S Zhao, J Liu, Y Shen, X Jiang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… [14] proposed a destination-aided cooperative jamming scheme to … untrusted relay system
where two sources S1 and S2 intend to exchange messages via the help of an untrusted relay

Secure relaying in non-orthogonal multiple access: Trusted and untrusted scenarios

A Arafa, W Shin, M Vaezi… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… We consider a downlink NOMA system … cooperative trusted relays help securing the data
from an external eavesdropper, and then we investigate the case of having an untrusted relay

A secure wireless information and energy cooperation transmission strategy in spectrum sharing networks with untrusted dual-relay

D Zhao, H Tian, P Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
… energy cooperation transmission strategy is proposed for spectrum sharing networks with
untrusted cooperative dual-relay. Furthermore, we consider two scenarios that the untrusted

Secrecy enhancement of cooperative NOMA networks with two-way untrusted relaying

M Awad, SM Ibraheem, SA Napoleon, W Saad… - IEEE …, 2020 - ieeexplore.ieee.org
… Motivated by the previous observations, in this paper, we propose an enhanced secrecy
performance of uplink/ downlink cooperative TWR NOMA network against untrusted

Secure transmission in SWIPT-powered two-way untrusted relay networks

J Zhang, X Tao, H Wu, X Zhang - IEEE Access, 2018 - ieeexplore.ieee.org
… Conventional studies on two-way relay generally considered … to provide incentives for relay
cooperation since the relay may not be … “Cooperative privacy preserving scheme for downlink

[PDF][PDF] Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach

L Lv, F Zhou, J Chen, N Al-Dhahir, F Li, Z Kong… - in IEEE Transactions on … - researchgate.net
… the untrusted relay. The design of secure cooperative communications with untrusted relays
… SECRECY IN SINGLE-ANTENNA RELAYING We consider a downlink transmission with a …

Cooperative secure transmission relying on optimal power allocation in the presence of untrusted relays, a passive eavesdropper and hardware impairments

M Moradikia, H Bastami, A Kuhestani, H Behroozi… - IEEE …, 2019 - ieeexplore.ieee.org
… CSIs to S via relay-aided cooperation, while they are untrustworthy in terms of retransmitting
… the untrusted relays and the passive Eve. We further assume that the untrusted relays are …