A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

SWIPT cooperative spectrum sharing for 6G-enabled cognitive IoT network

W Lu, P Si, G Huang, H Han, L Qian… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is able to provide various physical objects to exchange their
information through the 6G wireless communication network. However, with the large …

Secrecy-enhancing design for cooperative downlink and uplink NOMA with an untrusted relay

L Lv, H Jiang, Z Ding, L Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We investigate a secrecy-enhancing design for cooperative downlink and uplink non-
orthogonal multiple access (NOMA) transmissions with an untrusted relay. A source uses the …

Secure communication via a wireless energy harvesting untrusted relay

SS Kalamkar, A Banerjee - IEEE Transactions on Vehicular …, 2016 - ieeexplore.ieee.org
The broadcast nature of the wireless medium allows unintended users to eavesdrop on
confidential information transmission. In this regard, we investigate the problem of secure …

Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach

L Lv, F Zhou, J Chen, N Al-Dhahir - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We propose a novel non-orthogonal multiple access (NOMA)-inspired jamming and relaying
scheme to enhance the physical layer security of untrusted relay networks. Particularly …

Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers

A Kuhestani, A Mohammadi… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, a joint relay selection and power allocation (JRP) scheme is proposed to
enhance the physical layer security of a cooperative network, where a multiple antennas …

Secure two-way transmission via wireless-powered untrusted relay and external jammer

MT Mamaghani, A Kuhestani… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we propose a two-way secure communication scheme where two transceivers
exchange confidential messages via a wireless-powered untrusted amplify-and-forward …

Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer

A Kuhestani, A Mohammadi… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we examine the secrecy performance of two-way relaying between a large-
scale multiple antenna base station (BS) and a single antenna mobile user (MU) in the …

Relay selection for secure successive AF relaying networks with untrusted nodes

W Wang, KC Teh, KH Li - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
In this paper, the security aspect of an amplify-and-forward relaying network with untrusted
relay nodes is considered. The untrusted nodes can help to forward the received signal and …

Secrecy performance of untrusted relay systems with a full-duplex jamming destination

R Zhao, X Tan, DH Chen, YC He… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
To improve the secrecy performance of the untrusted relay system with a multiple-antenna
destination, a novel full-duplex destination jamming scheme with optimal antenna selection …