Y Zou, X Wang, W Shen - IEEE journal on selected areas in …, 2013 - ieeexplore.ieee.org
In this paper, we explore the physical-layer security in cooperative wireless networks with multiple relays where both amplify-and-forward (AF) and decode-and-forward (DF) protocols …
Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by …
V Ramani, SK Sharma - China Communications, 2017 - ieeexplore.ieee.org
Pervasive wireless computing and communication have created an ever-increasing demand for more radio spectrum. Since, most of the spectrum is underutilized, it motivated the …
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has …
We consider a cognitive radio (CR) network consisting of a secondary transmitter (ST), a secondary destination (SD) and multiple secondary relays (SRs) in the presence of an …
J Li, AP Petropulu, S Weber - IEEE transactions on signal …, 2011 - ieeexplore.ieee.org
We consider a cooperative wireless network in the presence of one or more eavesdroppers, and exploit node cooperation for achieving physical (PHY) layer based security. Two …
Secure communications can be impeded by eavesdroppers in conventional relay systems. This paper proposes cooperative jamming strategies for two-hop relay networks where the …
X He, A Yener - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario …
Physical-layer security is emerging as a promising paradigm of securing wireless communications against eavesdropping between legitimate users, when the main link …