نتایج جستجو برای: untrusted relay

تعداد نتایج: 19885  

This paper introduces three coding strategies for using the Luby Transform (LT) code in a relay aided power-line communication scheme. In the first method, the relay decodes the received packets and re-encodes them for transmission towards the destination. In the second method, the relay only forwardes a random linear combination of its received packets towards the destination, while in the thi...

A. Sahebalam Gh. Abed Hodtani M. Ahadi M. Osmani-Bojd,

In this study, we introduce a new two-way relay channel and obtain an inner bound and an outer bound for the discrete and memoryless multiple access relay channels with receiver-source feedback via two-way relay channel in which end nodes exchange signals by a relay node. And we extend these results to the Gaussian case. By numerical computing, we show that our inner bound is the same with o...

Journal: :IEEE Transactions on Vehicular Technology 2022

Unmanned aerial vehicles (UAVs) and Terahertz (THz) technology are envisioned to play paramount roles in next-generation wireless communications. In this paper, we present a novel secure UAV-assisted mobile relaying system operating at THz bands for data acquisition from multiple ground user equipments (UEs) towards destination. We assume that the UAV-mounted relay may act, besides providing se...

2014
Xiangyu Li

© 2014 Xiangyu Li et al. 183 http://dx.doi.org/10.4218/etrij.14.0213.0090 In this letter, we consider a cooperation system with multiple untrusted relays (URs). To keep the transmitted information confidential, we obtain joint channel characteristics (JCCs) through combining the channels from the source to the destination. Then, in the null space of the JCCs, jammers construct artificial noise ...

2017
Hequn Hu Zhenzhen Gao Xuewen Liao Victor C. M. Leung

The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem ha...

Journal: :IEEE Wireless Communications Letters 2022

The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence untrustworthy network nodes, referred as internal eavesdroppers. To address this potential and reliability flaw, by assuming all users are untrusted, letter investigates effective secrecy throughput (EST) for a NOMA system,...

In this paper, power efficiency (PE) of a relay interference channel including multiple transmitter nodes, multiple relay nodes and multiple destination is investigated. It is assumed that the destination and transmitter nodes are equipped with a few number of antennas but the relay nodes have a large number of antennas. Amplify-forward and decode-forward schemes by using MRT/MRC and ZF process...

M. Baghani S. Akhlaghi, V. Golzadeh

This paper concerns two-hop communication over relay-assisted Block fading channel. It is assumed there is not a direct link between the transmitter and the affiliated destination and the communication occurs in two hops through the use of a relay, where the amplify and forward (AF) strategy is employed at this node. In this case, in a Rayleigh block fading channel, the optimal weight function ...

Journal: :Journal of Discrete Algorithms 2007

From practical and theoretical viewpoints, performance analysis of communication systems by using information-theoretic results is important. In this paper, based on our previous work on Multiple Access Channel (MAC) and Multiple Access Relay Channel (MARC), we analyze the impact of a relay on the fundamental wireless communications concept, i.e., coverage region of MARC, as a basic model for u...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید