H Deng, HM Wang, W Guo… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we consider the problem of secure communications for a four-node system consisting of one source, one destination, one eavesdropper, and one helper. We …
A Behnad, MB Shahbaz, TJ Willink… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Secrecy rate achievability in three-node amplify-and-forward cooperative systems at the presence of passive eavesdroppers without location information is statistically analyzed and …
N Marina, A Hjorungnes - 2010 IEEE Wireless Communication …, 2010 - ieeexplore.ieee.org
Security is an important aspect for the future wireless networks. Since the number of network nodes increases constantly, and, in addition, the networks are decentralized and ad-hoc in …
MNY Koli, MZI Sarkar, S Tazrin… - 2014 17th International …, 2014 - ieeexplore.ieee.org
We consider a confidential communication system in which a source sends a confidential information to the destination in the presence of an eavesdropper. Multiple relays are used …
The use of multiple network configurations for cooperative jamming with the aim to increase the region with information-theoretic secrecy is analysed. The case with a single …
The use of cooperation to increase the information-theoretic secrecy in a decentralized ad- hoc wireless network is investigated. In particular, four cases of cooperative relaying are …
S Liu, R Zhang, L Song, Z Han… - 2011 IEEE Conference on …, 2011 - ieeexplore.ieee.org
To ensure security in data transmission is one of the most important issues for wireless relay networks. In this paper, we consider a cooperative network, consisting of one source node …
Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have …