In this paper, we consider communication on a two-hop channel in which a source wants to send information reliably and securely to the destination via a relay. We consider both the untrusted relay case and the external eavesdropper case. In the untrusted relay case, the relay behaves as an eavesdropper, and there is a cooperative node, which sends a jamming signal to confuse the relay when it is receiving from the source. In the external eavesdropper case, the relay is trusted, and there is an external node eavesdropping the communication. We propose two secure transmission schemes using the scaled compute-and forward technique. One of the schemes is based on a random binning code, and the other one is based on a lattice chain code. It is p...
Abstract—Relying on physical layer security is an attractive alternative of utilizing cryptographic ...
This paper studies cooperative transmission for securing a two-hop network where the eavesdropper ca...
We study a four terminal parallel relay-eavesdropper channel which consists of multiple independent ...
A two-hop channel is considered, in which the source wants to send information to the destination wh...
We consider a source-destination pair that can only communicate through an untrusted intermediate re...
We consider a source-destination pair that can only communicate through an untrusted intermediate r...
We study the problem of secure bidirectional relaying in the presence of an ``honest but curious'' r...
We study the problem of secure bidirectional relaying in the presence of an ``honest but curious'' r...
We investigate the problem of secure communications in a Gaussian multi-way relay channel applying t...
We consider the basic bidirectional relaying problem, in which two users in a wireless network wish ...
In this paper, we consider a two-way relay network where two sources can communicate only through an...
Abstract—In this paper, we consider a two-way relay network where two sources can communicate only t...
In this paper, we consider the design of a new secure transmission scheme for a four-node relay-eave...
We investigate the problem of secure communication over parallel relay channel in the presence of a ...
In this paper, the security of two-way relay communications in the presence of a passive eavesdroppe...
Abstract—Relying on physical layer security is an attractive alternative of utilizing cryptographic ...
This paper studies cooperative transmission for securing a two-hop network where the eavesdropper ca...
We study a four terminal parallel relay-eavesdropper channel which consists of multiple independent ...
A two-hop channel is considered, in which the source wants to send information to the destination wh...
We consider a source-destination pair that can only communicate through an untrusted intermediate re...
We consider a source-destination pair that can only communicate through an untrusted intermediate r...
We study the problem of secure bidirectional relaying in the presence of an ``honest but curious'' r...
We study the problem of secure bidirectional relaying in the presence of an ``honest but curious'' r...
We investigate the problem of secure communications in a Gaussian multi-way relay channel applying t...
We consider the basic bidirectional relaying problem, in which two users in a wireless network wish ...
In this paper, we consider a two-way relay network where two sources can communicate only through an...
Abstract—In this paper, we consider a two-way relay network where two sources can communicate only t...
In this paper, we consider the design of a new secure transmission scheme for a four-node relay-eave...
We investigate the problem of secure communication over parallel relay channel in the presence of a ...
In this paper, the security of two-way relay communications in the presence of a passive eavesdroppe...
Abstract—Relying on physical layer security is an attractive alternative of utilizing cryptographic ...
This paper studies cooperative transmission for securing a two-hop network where the eavesdropper ca...
We study a four terminal parallel relay-eavesdropper channel which consists of multiple independent ...