K Lee, J Bang, HH Choi - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
To solve security vulnerability and energy scarcity problems in relay, we propose two secure relaying protocols, power splitting-based relaying (PSR) and time switching-based relaying …
H Niu, B Zhang, KK Wong, Z Chu… - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
In this letter, we investigate the secrecy design in a wireless-powered amplify-and-forward relay network, where the relay is energy constrained and powered by the signal from the …
JT Lim, K Lee, Y Han - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
In this paper, we consider secure communication via a wireless-powered untrusted relay with outdated channel state information (CSI). The low security clearance of the relay means …
D He, C Liu, H Wang, TQS Quek - IEEE Wireless …, 2018 - ieeexplore.ieee.org
In this letter, we propose a learning-based wireless powered secure transmission, in which a source utilizes energy harvested from a power beacon to communicate with a legitimate …
Radio-frequency (RF) energy harvesting (EH) in wireless relaying networks has attracted considerable recent interest, especially for supplying energy to relay nodes in the Internet of …
This paper investigates the physical layer security (PLS) design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve). While the …
K Lee, JT Lim, HH Choi - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
We investigate the effect of outdated channel state information (CSI) on the secrecy performance of wireless-powered untrusted relay networks, in which the relay is a potential …
QN Le, DT Do, B An - International Journal of Communication …, 2017 - Wiley Online Library
In this paper, we investigate the problem of secure communication for a scenario, which consists of one pair of source‐destination nodes and one untrusted relay. The source …
K Lee, JP Hong, W Lee - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
In this paper, we consider wireless-powered secure communication with an energy harvesting receiver, which is allowed to harvest energy from the transmitted signals but not …