On the physical layer security of untrusted millimeter wave relaying networks: A stochastic geometry approach

M Ragheb, SMS Hemami, A Kuhestani… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
… enhancing the PLS of a cooperative mmWave system, where a … the source acquires the
downlink channel state information (… Secure communication in a cooperative mmWave system …

Hybrid protocol for wireless-powered untrusted relay networks with imperfect channel reciprocity

R Ma, H Wu, L Wang, J Ou, L Yan - China Communications, 2021 - ieeexplore.ieee.org
Cooperative relaying has been regarded as a powerful tool to expand communication …
over the downlink orthogonal frequency division multiple access systems with a wireless-powered …

Can a multi-hop link relying on untrusted amplify-and-forward relays render security?

MT Mamaghani, A Kuhestani, H Behroozi - Wireless Networks, 2021 - Springer
cooperative transmissions when the relays may themselves be eavesdroppers, ie, we may
face with the untrusted relaying scenario where the relays … issue, a new cooperative jamming …

Characterization of untrusted relaying networks in the presence of an adversary jammer

H Saedi, A Mohammadi, A Kuhestani - Wireless Networks, 2020 - Springer
… the secrecy performance of a cooperative wireless network comprised of a source, a destination
and an … The downlink scenario is shown where the relay operates as both assistant and …

Joint Resource Allocation in Secure OFDM Two-Way Untrusted Relay System

Y Jin, X Li, G Lv, M Zhao, Y Jin - Sensors, 2022 - mdpi.com
… We consider a two-way cooperative OFDM system with untrusted relaying, as shown in …
exchange confidential information via an untrusted relay R . The two-way relay operates in a half-…

Encryption over the air: Securing two-way untrusted relaying systems through constellation overlapping

H Xu, L Sun - IEEE Transactions on Wireless Communications, 2018 - ieeexplore.ieee.org
… overlapping at the relay. Consequently, an error floor is created at the untrusted relay, and
… method, which exploits the intrinsic user-cooperation mechanism to “virtualize” two identical …

Secure Precoding Scheme for Full-Duplex MIMO Untrusted Relay Network with Energy Harvesting

Y Fan, X Liao, R Yao, X Zuo… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
untrusted relay network, which obtains higher spectral efficiency theoretically than HD mode,
existing works always adopted cooperative jamming [11], source and relay … in the downlink. …

Secure green communication via untrusted two-way relaying: A physical layer approach

D Wang, B Bai, W Chen, Z Han - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
cooperation with the untrusted relay nodes can achieve a higher secrecy rate than just
treating the untrusted relay … frequencydivision multiple-access downlink network. An energy-…

Unequal secrecy protection for untrusted two-way relaying systems: Constellation overlapping and noise aggregation

L Sun, H Xu - IEEE Transactions on Vehicular Technology, 2018 - ieeexplore.ieee.org
cooperation period II is similar to that during cooperation … The detailed descriptions of the
operations at the untrusted relay as … cooperation period, the average transmit power of the relay

Ergodic Secrecy Capacity of Cooperative NOMA System with Untrusted User

S Ahmad, MJ Khan - Wireless Personal Communications, 2023 - Springer
… We propose a cooperative NOMA system for downlink communication that consists of an
untrusted user, a DF relay, and two mobile users with different channel conditions. …