Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for Internet of Things

M Letafati, A Kuhestani… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cooperative relaying can be introduced as a promising approach for data communication in
the Internet of Things (IoT), where the source and the destination may be placed far away. In …

Secrecy rate-optimum energy splitting for an untrusted and energy harvesting relay network

R Yao, Y Lu, TA Tsiftsis, N Qi, T Mekkawy, F Xu - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, a destination-assisted-jamming-based secure transmission is devised for an
untrusted and energy harvesting relay network. In the proposed scheme, both source and …

Optimal power allocation by imperfect hardware analysis in untrusted relaying networks

A Kuhestani, A Mohammadi, KK Wong… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
By taking a variety of realistic hardware imperfections into consideration, we propose an
optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a …

Impact of outdated CSI on the secrecy performance of wireless-powered untrusted relay networks

K Lee, JT Lim, HH Choi - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
We investigate the effect of outdated channel state information (CSI) on the secrecy
performance of wireless-powered untrusted relay networks, in which the relay is a potential …

Joint beamforming alignment with suboptimal power allocation for a two-way untrusted relay network

T Mekkawy, R Yao, TA Tsiftsis, F Xu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, a joint beamforming alignment and suboptimal power allocation (Sub-OPA) for
a two-way untrusted relay network is presented. Considering the link between users is …

Physical layer security in an untrusted energy harvesting relay network

H Shi, Y Cai, D Chen, J Hu, W Yang, W Yang - IEEE Access, 2019 - ieeexplore.ieee.org
The security performance in an amplify-and-forward dual-hop untrusted relay network is
considered. It is assumed that the source and multiple destinations are equipped with …

Security--Reliability Tradeoff for Untrusted and Selfish Relay-Assisted D2D Communications in Heterogeneous Cellular Networks for IoT

C Zhang, J Ge, F Gong, F Jia, N Guo - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
This paper investigates security-reliability tradeoff for untrusted and selfish two-way relay-
assisted device-to-device (D2D) communications in heterogeneous cellular networks for the …

Secure energy efficiency maximization for untrusted wireless-powered full-duplex relay networks under nonlinear energy harvesting

S Xu, X Song - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
In this article, we raise the concern on secure energy efficiency (SEE) over the wireless-
powered untrusted relay networks with nonlinear energy harvesting (EH). To achieve data …

Cooperative interference and power allocation in a bidirectional untrusted relay network with channel estimation errors

L Gong, X Ding, Q Zhu, N Zhou - IEEE Access, 2018 - ieeexplore.ieee.org
The secure communication of a two-way untrusted amplify-and-forward relay network under
the imperfect channel state information is investigated. To improve the secrecy of the relay …

Impact of imperfect channel state information on the physical layer security in D2D wireless networks using untrusted relays

M Izanlou, A Mohammadi… - Wireless Personal …, 2021 - Springer
In this paper, we investigate the impact of channel estimation errors on the physical layer
security of an overlaying device-to-device (D2D) wireless network with an amplify-and …