نتایج جستجو برای: Destination-based cooperative jamming
تعداد نتایج: 2998241 فیلتر نتایج به سال:
abstract—in this paper, the problem of secure transmission in two-hop amplify-and-forward (af) systems with an untrusted relay is investigated. to prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (dbcj) technique is used. in this method the destination sends an intended jamming signal to the relay. t...
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmis...
We employed node cooperation in a cooperative wireless network to achieve physical layerbased security. The case of a source-destination pair that works with the assistance of multiple cooperating nodes in the presence of an eavesdropper was considered in this study to improve the performance of secure wireless communications. A novel cooperative scheme, called the decode-and-forward plus coope...
This paper checks the correctness of our novel algorithm for secure, reliable and flexible transmission of big data in two-hop wireless networks using cooperative jamming scheme of attacker location unknown through Markovian process. Big data has to transmit in two-hop from source-to-relay and relay-to-destination node by deploying security in physical layer. Based on our novel algorithm, the n...
Cooperative jamming has been demonstrated to be an effective means to provide secret wireless communications and yet this is realized at the expense of the power consumption of the friendly jammers. This paper considers the scenario where friendly jammers harvest energy wirelessly from the signal transmitted by the source, and then use only the harvested energy to transmit the jamming signals f...
In this work, we investigate a practical secure multiple-input single-output (MISO) wireless transmission of information from source to destination assisted by cooperative devices. the first phase, space-time block code (STBC) is employed; thus, does not require any channel state (CSI). second devices are divided into two groups, depending on whether they serve for relaying or jamming. Based im...
This letter investigates the physical layer security in a wireless cooperative network where communication is assisted by a full-duplex (FD) untrusted relay in the presence of multiple external eavesdroppers. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. In order to confuse the different eavesdropping clus...
This paper is concerned with the relay and jammers selection in two-way cooperative networks to improve their physical layer security. Three different categories of selection schemes are proposed which are; selection schemes without jamming, selection schemes with conventional jamming and selection schemes with controlled jamming. The selection process is analyzed for two different network mode...
We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted rel...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید