Subcarrier pairing as channel gain tailoring: Joint resource allocation for relay-assisted secure OFDMA with untrusted users

R Saini, D Mishra, S De - Physical Communication, 2019 - Elsevier
… We consider an AF relay assisted system for its inherent simplicity … downlink of a trusted
relay assisted half duplex cooperative communication system with N subcarriers and M untrusted

Source-based jamming for physical-layer security on untrusted full-duplex relay

S Atapattu, N Ross, Y Jing… - IEEE Communications …, 2019 - ieeexplore.ieee.org
… For an untrusted cooperative network, the relay which is generally implemented …
untrusted nodes is becoming an increasing concern in 5G candidate applications, eg, uplink/downlink

Secrecy performance of finite-sized in-band selective relaying systems with unreliable backhaul and cooperative eavesdroppers

H Liu, PL Yeoh, KJ Kim, PV Orlik… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
… outage probability of the transmitter-relay cooperation under unreliable backhauls and the
eavesdropping collaboration with MRC across K eavesdroppers and over two time slots is …

Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay

H Yu, IG Lee - Future generation computer systems, 2020 - Elsevier
relaying with an untrusted relay is as follows: In the first phase, the source transmits secret
information and the destination sends an AN signal to the relay. … consider a downlink scenario …

NOMA in cooperative communication systems with energy-harvesting nodes and wireless secure transmission

A Salem, L Musavian - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
… to the case where the relay is an untrusted node, and cooperative jamming technique is …
We consider a down-link NOMA cooperative communication system, in which a source node …

Secrecy performance of non-orthogonal multiple access cognitive untrusted relaying with friendly jamming

Z Mobini - AEU-International Journal of Electronics and …, 2020 - Elsevier
… In our cooperative CR NOMA system, ST acts as an untrusted relay and hence, the
instantaneous secrecy capacity C s can be expressed as(14) C S = 1 2 log 2 ( 1 + γ PD ) - 1 2 log 2 ( …

Terahertz meets untrusted UAV-relaying: Minimum secrecy energy efficiency maximization via trajectory and communication co-design

MT Mamaghani, Y Hong - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
untrusted UAV-relay (UUR). To safeguard end-to-end communications, we present a secure
twophase transmission strategy with cooperative … UAV-THz downlink communications was …

A survey on human-centric communications in non-cooperative wireless relay networks

B Jedari, F Xia, Z Ning - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
… incentive mechanisms that aim to promote the cooperation of nodes in data relaying where
we categorize existing methods into three main classes: Tit-For-Tat, reputation-based, and …

Trust-Degree-Based Secure Relay Selection in SWIPT-Enabled Relay Networks

R Gao, L Xu, D Xu, J Bao - Electronics, 2023 - mdpi.com
Cooperative relays can potentially improve the coverage and system capacity without
increasing power consumption; … So, a cooperative transmission strategy of relays with an optimal …

Beamforming for cooperative secure transmission in cognitive two-way relay networks

Q Li, L Yang - IEEE Transactions on Information Forensics and …, 2019 - ieeexplore.ieee.org
… In this paper, we study beamforming design for cooperative secure transmission in CTWR
… In order to ensure the information security for PTs, we introduce the CT as the relay node, …