A survey on buffer-aided relay selection

N Nomikos, T Charalambous, I Krikidis… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Relays receive and retransmit signals between one or more sources and one or more
destinations. Cooperative relaying is a novel technique for wireless communications that …

Buffer-aided relay selection for cooperative diversity systems without delay constraints

I Krikidis, T Charalambous… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
In this paper, we study the relay selection problem for a finite buffer-aided decode-and-
forward cooperative wireless network. A relay selection policy that fully exploits the flexibility …

Relay selection for security enhancement in cognitive relay networks

Y Liu, L Wang, TT Duy, M Elkashlan… - IEEE wireless …, 2014 - ieeexplore.ieee.org
This letter proposes several relay selection policies for secure communication in cognitive
decode-and-forward relay networks, where a pair of cognitive relays is opportunistically …

Secure hybrid VLC-RF systems with light energy harvesting

G Pan, J Ye, Z Ding - IEEE Transactions on Communications, 2017 - ieeexplore.ieee.org
In this paper, a hybrid visible light communication-radio frequency (RF) system, including a
legitimate receiver (R) and an eavesdropper (E) is considered. R can harvest energy from …

A survey on cooperative jamming applied to physical layer security

M Atallah, G Kaddoum, L Kong - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Security has always played a critical role in wireless cooperative communication systems
design. Eavesdropping and jamming are two common threats to the information security in …

Destination assisted cooperative jamming for wireless physical-layer security

Y Liu, J Li, AP Petropulu - IEEE transactions on information …, 2013 - ieeexplore.ieee.org
A wireless network with one source, one destination, one eavesdropper, and multiple
decode-and-forward relays is considered. A two-slot cooperative relaying scheme is …

Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper

K Cumanan, Z Ding, B Sharif, GY Tian… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper studies different secrecy rate optimization problems for a multiple-input–multiple-
output (MIMO) secrecy channel. In particular, we consider a scenario where a …

Physical layer security with RF energy harvesting in AF multi-antenna relaying networks

A Salem, KA Hamdi, KM Rabie - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we analyze the secrecy capacity of a half-duplex energy harvesting (EH)-
based multi-antenna amplify-and-forward relay network in the presence of a passive …

Secure communication via a wireless energy harvesting untrusted relay

SS Kalamkar, A Banerjee - IEEE Transactions on Vehicular …, 2016 - ieeexplore.ieee.org
The broadcast nature of the wireless medium allows unintended users to eavesdrop on
confidential information transmission. In this regard, we investigate the problem of secure …

Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks

C Wang, HM Wang, XG Xia - IEEE Transactions on Wireless …, 2014 - ieeexplore.ieee.org
This paper studies the cooperative transmission for securing a decode-and-forward (DF) two-
hop network where multiple cooperative nodes coexist with a potential eavesdropper. Under …