Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (19)

Search Parameters:
Keywords = untrusted relay

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
14 pages, 2905 KB  
Article
On Security Performance of SWIPT Multi-User Jamming Based on Mixed RF/FSO Systems with Untrusted Relay
by Xingyue Guo, Shan Tu, Dexian Yan and Yi Wang
Sensors 2024, 24(24), 8203; https://doi.org/10.3390/s24248203 - 22 Dec 2024
Cited by 2 | Viewed by 1357
Abstract
This paper presents research on the security performance of a multi-user interference-based mixed RF/FSO system based on SWIPT untrusted relay. In this work, the RF and FSO channels experience Nakagami-m fading distribution and Málaga (M) turbulence, respectively. Multiple users transmit messages to the [...] Read more.
This paper presents research on the security performance of a multi-user interference-based mixed RF/FSO system based on SWIPT untrusted relay. In this work, the RF and FSO channels experience Nakagami-m fading distribution and Málaga (M) turbulence, respectively. Multiple users transmit messages to the destination with the help of multiple cooperating relays, one of which may become an untrusted relay as an insider attacker. In a multi-user network, SWIPT acts as a charging device for each user node. In order to prevent the untrusted relays from eavesdropping on the information, some users are randomly assigned to transmit artificial noise in order to interfere with untrusted relays, and the remaining users send information to relay nodes. Based on the above system model, the closed-form expressions of secrecy outage probability (SOP) and average secrecy capacity (ASC) for the mixed RF/FSO system are derived. The correctness of these expressions is verified by the Monte Carlo method. The influences of various key factors on the safety performance of the system are analyzed by simulations. The results show that the security performance of the system is considerably improved by increasing the signal–interference noise ratio, the number of interfering users, the time distribution factor and the energy conversion efficiency when the instantaneous signal-to-noise ratio (SNR) of the RF link instantaneous SNR is low. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

21 pages, 1927 KB  
Article
An Optimization Strategy for Security and Reliability in a Diamond Untrusted Relay Network with Cooperative Jamming
by Shen Qian and Meng Cheng
Network 2024, 4(4), 405-425; https://doi.org/10.3390/network4040020 - 25 Sep 2024
Cited by 2 | Viewed by 1253
Abstract
This paper tackles the challenge of secure and reliable data transmission in diamond network configurations featuring two untrusted relays with low-security clearance. We propose an innovative approach that employs lossy-decode and -forward relaying at these untrusted relays to boost transmission reliability while safeguarding [...] Read more.
This paper tackles the challenge of secure and reliable data transmission in diamond network configurations featuring two untrusted relays with low-security clearance. We propose an innovative approach that employs lossy-decode and -forward relaying at these untrusted relays to boost transmission reliability while safeguarding the source information from potential eavesdroppers. An essential contribution of this work is the introduction of the reliable and secure probability (RSP) metric. This metric assesses the likelihood of the destination successfully retrieving the original information while maintaining its confidentiality from untrusted relays. Our analysis shows that the integration of cooperative jamming signals markedly enhances the RSP, resulting in superior security and reliability. Simulation results confirm that optimal power distribution among the source, relays, and destination further maximizes the RSP. These findings underscore the effectiveness of our proposed scheme in ensuring secure and reliable communication in environments with untrusted relays, suggesting its potential as a robust solution for secure communications in diamond network configurations. Full article
Show Figures

Figure 1

16 pages, 628 KB  
Article
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation
by Shiming Fu, Tong Ling, Jun Yang and Yong Li
Entropy 2024, 26(9), 758; https://doi.org/10.3390/e26090758 - 4 Sep 2024
Viewed by 1292
Abstract
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference node. [...] Read more.
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference node. The channel between the relay and Alice serves as the reference channel. To enhance security during the channel measurement stage, a cooperative jamming-based scheme is proposed in this paper. This scheme allows the relay to obtain superimposed channel observations from both the reference channel and other relay channels. Then, a public discussion is utilized to enable all nodes to obtain estimates of the reference channel. Subsequently, the legitimate nodes can agree on a secret key (SK) that remains secret from the eavesdropper (Eve), or a private key (PK) that needs to be secret from both the relay and Eve. This paper also derives the lower and upper bounds of the SK/PK capacity. Notably, it demonstrates that there exists only a small constant difference between the SK/PK upper and lower bounds in the high signal-to-noise ratio (SNR) regime. Simulation results confirm the effectiveness of the proposed scheme for ensuring security and efficiency of group key generation. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

14 pages, 6358 KB  
Article
Practical Performance Analysis of MDI-QKD with Orbital Angular Momentum on UAV Relay Platform
by Dan Wu, Jiahao Li, Lan Yang, Zhifeng Deng, Jie Tang, Yuexiang Cao, Ying Liu, Haoran Hu, Ya Wang, Huicun Yu, Jiahua Wei, Huazhi Lun, Xingyu Wang and Lei Shi
Entropy 2024, 26(8), 635; https://doi.org/10.3390/e26080635 - 27 Jul 2024
Cited by 3 | Viewed by 2770
Abstract
The integration of terrestrial- and satellite-based quantum key distribution (QKD) experiments has markedly advanced global-scale quantum networks, showcasing the growing maturity of quantum technologies. Notably, the use of unmanned aerial vehicles (UAVs) as relay nodes has emerged as a promising method to overcome [...] Read more.
The integration of terrestrial- and satellite-based quantum key distribution (QKD) experiments has markedly advanced global-scale quantum networks, showcasing the growing maturity of quantum technologies. Notably, the use of unmanned aerial vehicles (UAVs) as relay nodes has emerged as a promising method to overcome the inherent limitations of fiber-based and low-Earth orbit (LEO) satellite connections. This paper introduces a protocol for measurement-device-independent QKD (MDI-QKD) using photon orbital angular momentum (OAM) encoding, with UAVs as relay platforms. Leveraging UAV mobility, the protocol establishes a secure and efficient link, mitigating threats from untrusted UAVs. Photon OAM encoding addresses reference frame alignment issues exacerbated by UAV jitter. A comprehensive analysis of atmospheric turbulence, state-dependent diffraction (SDD), weather visibility, and pointing errors on free-space OAM-state transmission systems was conducted. This analysis elucidates the relationship between the key generation rate and propagation distance for the proposed protocol. Results indicate that considering SDD significantly decreases the key rate, halving previous data results. Furthermore, the study identifies a maximum channel loss capacity of 26 dB for the UAV relay platform. This result is pivotal in setting realistic parameters for the deployment of UAV-based quantum communications and lays the foundation for practical implementation strategies in the field. Full article
(This article belongs to the Special Issue Progress in Quantum Key Distribution)
Show Figures

Figure 1

20 pages, 1130 KB  
Article
Cooperative Jamming-Assisted Untrusted Relaying Based on Game Theory for Next-Generation Communication Systems
by Nida Zamir, Bakhtiar Ali, Muhammad Fasih Uddin Butt, Muhammad Awais Javed, Byung Moo Lee and Soon Xin Ng
Appl. Sci. 2023, 13(13), 7863; https://doi.org/10.3390/app13137863 - 4 Jul 2023
Cited by 3 | Viewed by 1631
Abstract
In this contribution, we investigate the performance of an untrusted relaying system when Cooperative Jammers (CJs) are available. We propose two scenarios, Untrusted Relaying-aided Multiple Cooperative-Jammers-based Simultaneous Transmission (UR-MCJST) and an Untrusted Relaying-aided Multiple Cooperative Jammers-based Time-Division Transmission (UR-MCJTDT). The performances of both [...] Read more.
In this contribution, we investigate the performance of an untrusted relaying system when Cooperative Jammers (CJs) are available. We propose two scenarios, Untrusted Relaying-aided Multiple Cooperative-Jammers-based Simultaneous Transmission (UR-MCJST) and an Untrusted Relaying-aided Multiple Cooperative Jammers-based Time-Division Transmission (UR-MCJTDT). The performances of both UR-MCJST and UR-MCJTDT schemes are investigated. The source node is the primary user (PU) that has access to a transmission bandwidth. An untrusted relay is employed for improving the reliability of the PU transmission, while CJs are invoked for improving the secrecy rate of the PU transmission. The transmission strategy for the scheme proposed in this paper is split into three unique phases. The first phase is called the broadcast-and-jamming phase, while the second phase is called the relaying phase, and the final phase is called CJ’s secondary phase, which is used for transmitting the secondary user message. More explicitly, CJs transmit noise for impairing the untrusted relay node’s ability to decode the message during the broadcast-and-jamming phase. In compensation for their help, CJs are allocated part of the available spectrum by the PU for their transmission during the secondary transmission phase. A Stackelberg leader–follower game was considered between the PU and the CJs, while a power control game that is based on the well-known Nash equilibrium is employed by the CJs. Furthermore, an investigation into the effect of invoking simultaneous transmission and time-division-based transmission scenarios during the CJs’ secondary transmission phase was carried out. Finally, we evaluated the achievable secrecy rate of the PU and the utility rate of the CJs in our proposed scheme. Full article
Show Figures

Figure 1

15 pages, 2580 KB  
Article
Cost-Optimization-Based Quantum Key Distribution over Quantum Key Pool Optical Networks
by Jie Jia, Bowen Dong, Le Kang, Huanwen Xie and Banghong Guo
Entropy 2023, 25(4), 661; https://doi.org/10.3390/e25040661 - 14 Apr 2023
Cited by 12 | Viewed by 3458
Abstract
The Measurement-Device-Independent-Quantum Key Distribution (MDI-QKD) has the advantage of extending the secure transmission distances. The MDI-QKD combined with the Hybrid-Trusted and Untrusted Relay (HTUR) is used to deploy large-scale QKD networks, which effectively saves deployment cost. We propose an improved scheme for the [...] Read more.
The Measurement-Device-Independent-Quantum Key Distribution (MDI-QKD) has the advantage of extending the secure transmission distances. The MDI-QKD combined with the Hybrid-Trusted and Untrusted Relay (HTUR) is used to deploy large-scale QKD networks, which effectively saves deployment cost. We propose an improved scheme for the QKD network architecture and cost analysis, which simplifies the number of QKD transmitters and incorporates the quantum key pool (QKP) in the QKD network. We developed a novel Hybrid-QKD-Network-Cost (HQNC) heuristic algorithm to solve the cost optimization problem. Simulations verified that the scheme in this paper could save the cost by over 50 percent and 90 percent, respectively. Full article
(This article belongs to the Special Issue Classical and Quantum Networks: Theory, Modeling and Optimization)
Show Figures

Figure 1

16 pages, 6091 KB  
Article
Topology-Abstraction-Based Protection Scheme in Quantum Key Distribution Networks with Partially Trusted Relays
by Qin Zhang, Yikai Liu, Xiaosong Yu, Yongli Zhao and Jie Zhang
Photonics 2022, 9(4), 239; https://doi.org/10.3390/photonics9040239 - 3 Apr 2022
Cited by 5 | Viewed by 3963
Abstract
Quantum key distribution (QKD) can protect the exchange process of confidential information between communicating parties. By using the basic principles of quantum mechanics and combined with “one-time pad” cipher encryption, information can be unconditionally secure. The BB84 protocol first describes the method of [...] Read more.
Quantum key distribution (QKD) can protect the exchange process of confidential information between communicating parties. By using the basic principles of quantum mechanics and combined with “one-time pad” cipher encryption, information can be unconditionally secure. The BB84 protocol first describes the method of transmitting information by photon polarization state, and it expounds the transmission process of services between trusted relays. However, due to the defects of real experimental devices, there are security vulnerabilities in QKD in a real system. The birth of measurement-device-independent quantum key distribution (MDI-QKD) protocol solves the problem, providing immunity to hacker attacks at the end of the detector. It can enable both sides of the transmission service to establish a connection and generate secret keys through an untrusted relay node to ensure information security. However, the types and properties of link nodes in quantum key distribution network (QKDN) based on partially trusted relay are more complex, which can easily result in network fault. Therefore, how to prevent the impact of failure on QKDN has become an urgent problem. In this paper, we propose a protection scheme for QKDN with partially trusted relays. The method deals with trusted and untrusted relays differently and constructs the working and protection paths of the secret key for each service. It reduces resource conflict between the protection and working paths by establishing a key protection threshold, which realizes the resource trade-off between the two factors. Simulation results show that the scheme provides effective protection to the services, and it improves the stability and reliability of QKDN based on partially trusted relay. Full article
(This article belongs to the Topic Fiber Optic Communication)
Show Figures

Figure 1

19 pages, 438 KB  
Article
Joint Resource Allocation in Secure OFDM Two-Way Untrusted Relay System
by Yifeng Jin, Xunan Li, Guocheng Lv, Meihui Zhao and Ye Jin
Sensors 2022, 22(6), 2398; https://doi.org/10.3390/s22062398 - 21 Mar 2022
Viewed by 2520
Abstract
The security issue of wireless communication is a common concern because of its broadcast nature, especially when the relay becomes an eavesdropper. In the orthogonal frequency division multiplexing (OFDM) relay system, when the relay is untrusted, the security of the system faces serious [...] Read more.
The security issue of wireless communication is a common concern because of its broadcast nature, especially when the relay becomes an eavesdropper. In the orthogonal frequency division multiplexing (OFDM) relay system, when the relay is untrusted, the security of the system faces serious threats. Although there exist some resource allocation schemes in a single-carrier system with untrusted relaying, it is difficult to apply them to the multi-carrier system. Hence, a resource allocation scheme for the multi-carrier system is needed. Compared to the one-way relay system, a two-way relay system can improve the data transmission efficiency. In this paper, we consider joint secure resource allocation for a two-way cooperative OFDM system with an untrusted relay. The joint resource allocation problem of power allocation and subcarrier pairing is formulated to maximize the sum secrecy rate of the system under individual power constraints. To solve the non-convex problem efficiently, we propose an algorithm based on the alternative optimization method. The proposed algorithm is evaluated by simulation results and compared with the benchmarks in the literature. According to the numerical results, in a high signal-to-noise ratio (SNR) scenario, the proposed algorithm improves the achievable sum secrecy rate of the system by more than 15% over conventional algorithms. Full article
(This article belongs to the Special Issue Security and Communication Networks)
Show Figures

Figure 1

17 pages, 366 KB  
Article
Secure Physical Layer Network Coding versus Secure Network Coding
by Masahito Hayashi
Entropy 2022, 24(1), 47; https://doi.org/10.3390/e24010047 - 27 Dec 2021
Cited by 4 | Viewed by 3214
Abstract
When a network has relay nodes, there is a risk that a part of the information is leaked to an untrusted relay. Secure network coding (secure NC) is known as a method to resolve this problem, which enables the secrecy of the message [...] Read more.
When a network has relay nodes, there is a risk that a part of the information is leaked to an untrusted relay. Secure network coding (secure NC) is known as a method to resolve this problem, which enables the secrecy of the message when the message is transmitted over a noiseless network and a part of the edges or a part of the intermediate (untrusted) nodes are eavesdropped. If the channels on the network are noisy, the error correction is applied to noisy channels before the application of secure NC on an upper layer. In contrast, secure physical layer network coding (secure PLNC) is a method to securely transmit a message by a combination of coding operation on nodes when the network is composed of set of noisy channels. Since secure NC is a protocol on an upper layer, secure PLNC can be considered as a cross-layer protocol. In this paper, we compare secure PLNC with a simple combination of secure NC and error correction over several typical network models studied in secure NC. Full article
(This article belongs to the Special Issue Wireless Networks: Information Theoretic Perspectives Ⅱ)
Show Figures

Figure 1

9 pages, 1550 KB  
Article
Free Space Measurement Device Independent Quantum Key Distribution with Modulating Retro-Reflectors under Correlated Turbulent Channel
by Xingyu Wang, Wei Liu, Tianyi Wu, Chang Guo, Yijun Zhang, Shanghong Zhao and Chen Dong
Entropy 2021, 23(10), 1299; https://doi.org/10.3390/e23101299 - 1 Oct 2021
Cited by 5 | Viewed by 3112
Abstract
Modulating retro-reflector (MRR), originally introduced to support laser communication, relieves most of the weight, power, and pointing requirements to the ground station. In this paper, a plug-and-play measurement device independent quantum key distribution (MDI-QKD) scheme with MRR is proposed not only to eliminate [...] Read more.
Modulating retro-reflector (MRR), originally introduced to support laser communication, relieves most of the weight, power, and pointing requirements to the ground station. In this paper, a plug-and-play measurement device independent quantum key distribution (MDI-QKD) scheme with MRR is proposed not only to eliminate detector side channels and allow an untrusted satellite relay between two users, but also to simplify the requirements set-ups in practical flexible moving scenarios. The plug-and-play architecture compensates for the polarization drift during the transmission to provide superior performance in implementing the MDI-QKD on a free-space channel, and the MRR device is adopted to relax the requirements on both communication terminals. A double-pass correlated turbulent channel model is presented to investigate the complex and unstable channel characteristics caused by the atmospheric turbulence. Furthermore, the security of the modified MDI-QKD scheme is analyzed under some classical attacks and the simulation results indicate the feasibility under the situation that the system performance deteriorates with the increase of fading correlation coefficient and the turbulence intensity, which provides a meaningful step towards an MDI-QKD based on the moving platforms to join a dynamic quantum network with untrusted relays. Full article
(This article belongs to the Special Issue Practical Quantum Communication)
Show Figures

Figure 1

25 pages, 1575 KB  
Article
A Universal Routing Algorithm Based on Intuitionistic Fuzzy Multi-Attribute Decision-Making in Opportunistic Social Networks
by Yao Yu, Jiong Yu, Zhigang Chen, Jia Wu and Yeqing Yan
Symmetry 2021, 13(4), 664; https://doi.org/10.3390/sym13040664 - 12 Apr 2021
Cited by 3 | Viewed by 2073
Abstract
With the vigorous development of big data and the 5G era, in the process of communication, the number of information that needs to be forwarded is increasing. The traditional end-to-end communication mode has long been unable to meet the communication needs of modern [...] Read more.
With the vigorous development of big data and the 5G era, in the process of communication, the number of information that needs to be forwarded is increasing. The traditional end-to-end communication mode has long been unable to meet the communication needs of modern people. Therefore, it is particularly important to improve the success rate of information forwarding under limited network resources. One method to improve the success rate of information forwarding in opportunistic social networks is to select appropriate relay nodes so as to reduce the number of hops and save network resources. However, the existing routing algorithms only consider how to select a more suitable relay node, but do not exclude untrusted nodes before choosing a suitable relay node. To select a more suitable relay node under the premise of saving network resources, a routing algorithm based on intuitionistic fuzzy decision-making model is proposed. By analyzing the real social scene, the algorithm innovatively proposes two universal measurement indexes of node attributes and quantifies the support degree and opposition degree of node social attributes to help node forward by constructing intuitionistic fuzzy decision-making matrix. The relay nodes are determined more accurately by using the multi-attribute decision-making method. Simulation results show that, in the best case, the forwarding success rate of IFMD algorithm is 0.93, and the average end-to-end delay, network load, and energy consumption are the lowest compared with Epidemic algorithm, Spray and Wait algorithm, NSFRE algorithm, and FCNS algorithm. Full article
Show Figures

Figure 1

13 pages, 1881 KB  
Article
Secure Communication for Uplink Cellular Networks Assisted with Full-Duplex Device-to-Device User
by Xin Song, Lin Xia, Siyang Xu and Yue Wang
Future Internet 2020, 12(10), 175; https://doi.org/10.3390/fi12100175 - 18 Oct 2020
Cited by 3 | Viewed by 2495
Abstract
In this paper, the secure communication based on the full-duplex (FD) device-to-device (D2D) in cellular networks is proposed. For the proposed scheme, the novel model is established, in which a D2D user is played as a relay operating in FD mode to assist [...] Read more.
In this paper, the secure communication based on the full-duplex (FD) device-to-device (D2D) in cellular networks is proposed. For the proposed scheme, the novel model is established, in which a D2D user is played as a relay operating in FD mode to assist in the secure transmission of uplink information. Considering that the D2D user as a relay is untrusted, D2D link rate maximization is formulated with the constraint of secrecy rate, which ensures the security of uplink cellular networks. To cope with the optimization problem, the optimal power allocation factors of the cellular user (CU) and the D2D user are jointly optimized. Firstly, by using the monotonicity of the objective function, the optimal solution of the power allocation factor at the D2D user can be obtained. Subsequently, the closed-form expression of the optimal power allocation factor at the CU is derived and verified that the solution is the global minimum point. Simulation results verify that the proposed scheme has better output performance than the conventional scheme. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

17 pages, 1110 KB  
Article
Open-Destination Measurement-Device-Independent Quantum Key Distribution Network
by Wen-Fei Cao, Yi-Zheng Zhen, Yu-Lin Zheng, Shuai Zhao, Feihu Xu, Li Li, Zeng-Bing Chen, Nai-Le Liu and Kai Chen
Entropy 2020, 22(10), 1083; https://doi.org/10.3390/e22101083 - 26 Sep 2020
Cited by 5 | Viewed by 3905
Abstract
Quantum key distribution (QKD) networks hold promise for sharing secure randomness over multi-partities. Most existing QKD network schemes and demonstrations are based on trusted relays or limited to point-to-point scenario. Here, we propose a flexible and extensible scheme named as open-destination measurement-device-independent QKD [...] Read more.
Quantum key distribution (QKD) networks hold promise for sharing secure randomness over multi-partities. Most existing QKD network schemes and demonstrations are based on trusted relays or limited to point-to-point scenario. Here, we propose a flexible and extensible scheme named as open-destination measurement-device-independent QKD network. The scheme enjoys security against untrusted relays and all detector side-channel attacks. Particularly, any users can accomplish key distribution under assistance of others in the network. As an illustration, we show in detail a four-user network where two users establish secure communication and present realistic simulations by taking into account imperfections of both sources and detectors. Full article
Show Figures

Figure 1

27 pages, 530 KB  
Article
General Secure Information Exchange Protocol for a Multiuser MIMO Relay Channel
by Qiao Liu, Hui Li and Yong Wang
Entropy 2019, 21(11), 1054; https://doi.org/10.3390/e21111054 - 28 Oct 2019
Viewed by 2815
Abstract
Secure information exchange occurs in many recently emerging cooperative-based networks, such as 5G networks (especially those with a Device to Device architecture), the Internet of Things, and vehicular ad hoc networks. However, the existing information exchange protocols only focus on either pairwise information [...] Read more.
Secure information exchange occurs in many recently emerging cooperative-based networks, such as 5G networks (especially those with a Device to Device architecture), the Internet of Things, and vehicular ad hoc networks. However, the existing information exchange protocols only focus on either pairwise information exchange or group information exchange, and none of these protocols enable private and public information exchange to occur simultaneously. Thus, a general secure information exchange protocol for a multiuser channel is desirable. With this motivation, this paper investigates simultaneous private and public information exchange in a Multiple Inputs Multiple Outputs (MIMO) multiuser relay channel. In an aim to achieve this goal, signal alignment is chosen as the core technique. With the designed precoding matrix for each user, private information is aligned with its exchange partner, and public information forms a coding chain at the relay. With the aligned private signal and public coding chain, neither an untrusted relay nor external eavesdroppers can recover the original individual information. Performance analyses of the proposed protocol are conducted. First, we conduct transmission performance analyses from the perspective of time slot cost. Second, we conduct a security analysis for private information exchange and public information exchange. Third, we conduct secrecy sum-rate analysis for three attack scenarios: an untrusted relay attack only, an eavesdropper attack only, and both an untrusted relay and eavesdropper attack. The simulations are conducted to demonstrate that the proposed protocol can enable simultaneous private and public information exchange while resisting attacks by an undesired receiver, an untrusted relay, and external eavesdroppers. Full article
(This article belongs to the Special Issue Information-Theoretic Security II)
Show Figures

Figure 1

21 pages, 389 KB  
Article
Secure Transmission for Simultaneous Wireless Information and Power Transfer in AF Untrusted Relay Networks
by Hui Shi, Weiwei Yang, Dechuan Chen, Yunpeng Luo and Yueming Cai
Sensors 2019, 19(1), 76; https://doi.org/10.3390/s19010076 - 26 Dec 2018
Cited by 5 | Viewed by 3880
Abstract
This paper investigates secure communications of energy harvesting untrusted relay networks, where the destination assists jamming signal to prevent the untrusted relay from eavesdropping and to improve the forwarding ability of the energy constrained relay. Firstly, the source and the destination transmit the [...] Read more.
This paper investigates secure communications of energy harvesting untrusted relay networks, where the destination assists jamming signal to prevent the untrusted relay from eavesdropping and to improve the forwarding ability of the energy constrained relay. Firstly, the source and the destination transmit the signals to the relay with maximal ratio transmission (MRT) technique or transmit antenna selection (TAS) technique. Then, the destination utilizes maximal ratio combining (MRC) technique or receive antenna selection (RAS) technique to receive the forwarded information. Therefore, four transmission and reception schemes are considered. For each scheme, the closed-form expressions of the secrecy outage probability (SOP) and the connection outage probability (COP) are derived. Besides, the effective secrecy throughput (EST) metric is analyzed to achieve a good tradeoff between security and reliability. In addition, the asymptotic performance of EST is also considered at the high signal-to-noise ratio (SNR). Finally, simulation results illustrate that: (1) the EST of the system with MRT and MRC scheme are superior to other schemes, however, in the high SNR regime, the EST of the system with MRT scheme is inferior to TAS; and (2) for the source node, there exists an optimal number of antennas to maximize the EST of the proposed schemes. Full article
(This article belongs to the Special Issue Energy Harvester Sensing)
Show Figures

Figure 1

Back to TopTop