AN-aided relay-selection scheme for securing untrusted RF-EH relay systems
A Mabrouk, A El Shafie, K Tourki… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Energy harvesting (EH) technology has imposed new constraints on the amount of time an
energy-constrained relay node needs to use for EH and information forwarding. Moreover …
energy-constrained relay node needs to use for EH and information forwarding. Moreover …
Securing untrusted RF-EH relay networks using cooperative jamming signals
A El Shafie, A Mabrouk, K Tourki, N Al-Dhahir… - IEEE …, 2017 - ieeexplore.ieee.org
We propose a new scheme to secure a wireless-powered untrusted cooperative-
communication network, where a legitimate source node (Alice) transmits her information …
communication network, where a legitimate source node (Alice) transmits her information …
多中继与多用户选择的中继系统安全性能分析
任婷洁, 李光球, 程英 - 电信科学, 2019 - infocomm-journal.com
为了考察使用多中继选择与多用户选择的放大转发(AF) 中继系统的物理层安全性能,
推导了其在瑞利衰落信道上和联合发送天线选择/接收最大比合并天线分集下的非零安全容量 …
推导了其在瑞利衰落信道上和联合发送天线选择/接收最大比合并天线分集下的非零安全容量 …
Utility regions for DF relay in OFDMA-based secure communication with untrusted users
This letter investigates the utility of a trusted decode-and-forward relay in OFDMA-based
secure communication system with untrusted users. For deciding on the use of relay, we first …
secure communication system with untrusted users. For deciding on the use of relay, we first …
Leakage rate‐based untrustworthy relay selection with imperfect channel state information: the outage and security trade‐off analysis
V Ozduran - IET Communications, 2019 - Wiley Online Library
This study investigates the effects of the imperfect channel state information on the leakage
rate‐based untrustworthy relay selection strategies. The investigation considers that the …
rate‐based untrustworthy relay selection strategies. The investigation considers that the …
Leakage rate based hybrid untrustworthy relay selection for a dual-hop half/full-duplex bi-directional wireless relaying networks
V Ozduran - 2017 advances in wireless and optical …, 2017 - ieeexplore.ieee.org
This paper investigates the leakage rate based hybrid untrustworthy relay selection strategy.
The investigation considers a dual-hop multiple half/full-duplex untrustworthy bidirectional …
The investigation considers a dual-hop multiple half/full-duplex untrustworthy bidirectional …
Leakage rate based hybrid untrustworthy relay selection with channel estimation error
V Ozduran - 2017 25th Telecommunication Forum (TELFOR), 2017 - ieeexplore.ieee.org
This paper investigates the imperfect channel state information that is caused by channel
estimation error on the leakage rate based hybrid untrustworthy relay selection strategy. The …
estimation error on the leakage rate based hybrid untrustworthy relay selection strategy. The …
Novel subcarrier pairing strategy for DF relayed secure OFDMA with untrusted users
This paper investigates joint resource allocation problem involving subcarrier allocation,
subcarrier pairing (SCP), and power allocation for maximizing sum secure rate in a decode …
subcarrier pairing (SCP), and power allocation for maximizing sum secure rate in a decode …
Relay-selection refinement scheme for secrecy in untrusted RF-EH relay systems with adaptive transmission under outdated CSI
A Mabrouk, K Tourki, A El Shafie… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we investigate physical layer security of a dual-hop untrusted multiple amplify-
and-forward energy-harvesting relaying network. Two main objectives are considered …
and-forward energy-harvesting relaying network. Two main objectives are considered …
Leakage rate–based untrustworthy relay selection
V Ozduran - Transactions on Emerging Telecommunications …, 2019 - Wiley Online Library
This paper investigates the leakage rate based untrustworthy relay selection strategies,
which are based on the untrustworthy relay terminals operate in half‐duplex, full‐duplex …
which are based on the untrustworthy relay terminals operate in half‐duplex, full‐duplex …