Secrecy performance analysis of multihop transmission protocols in cluster networks

TT Duy, HY Kong - Wireless Personal Communications, 2015 - Springer
In this paper, we investigate the secured transmission in cluster-based multi-hop networks.
In particular, we evaluate the secrecy performance of three various protocols over Rayleigh …

单窃听双跳协作网络的中继选择方案及其性能分析.

阳俐君, 曹张华, 张士兵… - Journal of Chongqing …, 2016 - search.ebscohost.com
研究了安全通信意义下, 单向译码转发(decode and forward, DF) 协作无线网络的中继选择
问题. 针对窃听者既能获得信源发出的信号, 又能窃取中继节点转发数据的通信系统, 提出了3 …

Performance analysis of the link selection for secure device-to-device communications with an untrusted relay

S Naderi, MR Javan - Turkish Journal of Electrical …, 2017 - journals.tubitak.gov.tr
In this paper, we study the performance of the selection combining and switch and stay
combining methods in secure cooperative device-to-device (D2D) communications …

Combining binary jamming and network coding to improve outage performance in two-way relaying networks under physical layer security

SQ Nguyen, HY Kong - Wireless Personal Communications, 2015 - Springer
By generating a jamming message at the jammer node, a system can reduce wiretapping in
the physical layer because this message can refuse the illegal eavesdropper node. The …

Effect of co-channel interference on two-way untrustworthy relay selection

P Shams - Wireless Personal Communications, 2020 - Springer
This study investigates the impact of co-channel interference on two-way untrustworthy relay
selection over Rayleigh fading environment. The investigation considers that two source …

Secrecy outage performance of relay networks under interference constraint

TT Duy, VNQ Bao - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
In this paper, we study secrecy outage performance of dual-hop relay protocols in underlay
cognitive radio network. In particular, we derive exact and asymptotic closed-form …

[PDF][PDF] Joint Source-Relay Selection Scheme for Cooperative Networks under Eavesdropping Environment.

J Xue, H Zhu, X Liao, Z Su - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
In this paper, we propose a low complexity opportunistic source-relay selection algorithm
based on power allocation for multi-source multi-relay cooperative network. We consider …

User Pair-Relay Matching in a Multiple User Pair and Multiple Untrusted Relay Network

R Yao, D Song, L Yao, TA Tsiftsis… - 2020 International …, 2020 - ieeexplore.ieee.org
In this paper, considering a multi-user pair and multi-untrusted relay two-way transmission
network, a user pair-relay matching scheme is proposed. To maximize the achievable …

Exact outage probability of cooperative secrecy transmission: Impact of unavailable relays

PN Son, HY Kong - Wireless Personal Communications, 2015 - Springer
The impact of unavailable relays is a serious issue in cooperative communication schemes,
where the operation state of relays affects optimal relay selection. In addition, secure signal …

[PDF][PDF] ĐÁNH GIÁ HIỆU NĂNG BẢO MẬT CỦA MẠNG CHUYỂN TIẾP ĐA CHẶNG CLUSTER VỚI KỸ THUẬT CHỌN LỰA NÚT CHUYỂN TIẾP

V NHIỄU - researchgate.net
Lời đầu tiên em xin chân thành gửi lời cảm ơn sâu sắc đến thầy TS. Trần Trung Duy đã
hướng dẫn tận tình, chỉ bảo em trong suốt quá trình thực hiện luận văn. Thầy đã trang bị cho …