Secrecy performance analysis for fixed-gain energy harvesting in an Internet of Things with untrusted relays

DD Tran, C So-In, H Tran - IEEE Access, 2018 - ieeexplore.ieee.org
… (namely an untrusted relay). Thus, to improve the secrecy performance of the considered
system, we propose an optimal scheme, namely best-sensor-best-untrusted-relay (BSBR), and …

Enhancing secrecy performance of energy harvesting NOMA systems using IoT user scheduling under untrusted users

NK Largani, B Akhbari - IET Communications, 2022 - Wiley Online Library
… an untrusted user exists, we present an IoT user scheduling strategy in two stages. Specifically,
the scheduled IoT user … transmission of its own message against the untrusted far user. …

Rate splitting in the presence of untrusted users: Outage and secrecy outage performances

M Abolpour, S Aïssa, L Musavian… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
… , a thorough investigation of the performance of rate splitting is conducted in terms of outage
and secrecy outage for the simultaneous service to a near user and far user, where the latter …

On the secrecy performance and power allocation in relaying networks with untrusted relay in the partial secrecy regime

DPM Osorio, H Alves, EEB Olivo - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
untrusted relays. To this end, we examine a three-node AF relaying network where the relay
is untrusted … Differently from previous related works, we analyze the secrecy performance in …

Novel outage-aware NOMA protocol for secrecy fairness maximization among untrusted users

S Thapar, D Mishra, R Saini - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
… to provide positive secrecy rates at all untrusted users with … to all users, secrecy performance
of the far user against the … To analyze secrecy performance, we derive expressions of …

Enhancing secrecy for NOMA untrusted relay networks with user scheduling and jamming

B He, L Lv, L Yang, J Chen - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
secrecy performance, we propose an opportunistic NU scheduling scheme to maximize the
sum secrecy … , the closed-form expressions of the average secrecy rate (ASR) are derived for …

Secrecy analysis of multiuser untrusted amplify‐and‐forward relay networks

D Deng, X Li, L Fan, W Zhou… - Wireless …, 2017 - Wiley Online Library
… selected user. To reduce the information leakage, we consider two selection criteria for user
… We study the impact of the direct and relaying links on the system secrecy performance by …

Physical-layer security of NOMA systems under untrusted users

BM ElHalawany, K Wu - 2018 IEEE global communications …, 2018 - ieeexplore.ieee.org
… and the secrecy performance of a two-users NOMA system with an untrusted user. The …
-optimal performance of the pair under a secrecy outage probability constraint of the trusted …

Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden

M Forouzesh, P Azmi, A Kuhestani… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… We focus on the worstcase performance, in which we maximize the average rate for the
worst channel and Warden’s location mismatch. We observe that the imperfect CSI of Carol has …

Secrecy fairness aware NOMA for untrusted users

S Thapar, D Mishra, R Saini - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
untrusted users, we design a novel secure NOMA transmission protocol to maximize secrecy
fairness among users. … only far user as untrusted and analyzed the secrecy performance of …