In this paper, we investigate physical layer network coding (PNC) and destination assisted cooperative jamming (DACJ) for physical layer security in wireless sensor networks, in which there is one source, one destination, a cluster of intermediate nodes, and multiple eavesdroppers. Under the PNC protocol, the considered two-hop wireless sensor network implements a complete transmission process in two phases. In the first phase, through sending a jamming signal from the destination and exploiting the PNC at the relay, the relay decodes the exclusive-or (XOR) performed form of the source and the jamming message. Therefore, the jamming signal can degrade the wire-tap channels without hampering the legitimate channel. In the second phase, the r...
In wireless networks, the bandwidth is considered one of the most scarce and valuable resources. The...
Physical layer security has been recently recognized as a promising new design paradigm to provide s...
In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, cons...
In this paper, we investigate physical layer network coding (PNC) and destination assisted cooperati...
This paper exploits physical layer network coding (PNC) and friendly jamming to improve their physic...
Interference is generally considered as the redundant and unwanted occurrence in wireless communicat...
Interference is generally considered as the redundantand unwanted occurrence in wireless communicati...
Abstract — This paper considers the problem of secure communication in Wireless Sensor Networks in t...
The fast development of wireless networks, which are intrinsically exposed to eavesdropping, has cre...
The broadcast characteristic of a wireless networks which is exploited in cooperative communications...
We propose in this paper a physical layer security (PLS) scheme for dual-hop cooperative networks in...
In this paper, we investigate secure two-user AF relaying networks based on a destination assisted c...
This paper investigates the security at the physical layer of cooperative relay communications. Insp...
Abstract In this work, we analyze the secrecy rate in a cooperative network, where a source node is ...
International audience—Network Coding is a key strategy for meeting the needs of information technol...
In wireless networks, the bandwidth is considered one of the most scarce and valuable resources. The...
Physical layer security has been recently recognized as a promising new design paradigm to provide s...
In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, cons...
In this paper, we investigate physical layer network coding (PNC) and destination assisted cooperati...
This paper exploits physical layer network coding (PNC) and friendly jamming to improve their physic...
Interference is generally considered as the redundant and unwanted occurrence in wireless communicat...
Interference is generally considered as the redundantand unwanted occurrence in wireless communicati...
Abstract — This paper considers the problem of secure communication in Wireless Sensor Networks in t...
The fast development of wireless networks, which are intrinsically exposed to eavesdropping, has cre...
The broadcast characteristic of a wireless networks which is exploited in cooperative communications...
We propose in this paper a physical layer security (PLS) scheme for dual-hop cooperative networks in...
In this paper, we investigate secure two-user AF relaying networks based on a destination assisted c...
This paper investigates the security at the physical layer of cooperative relay communications. Insp...
Abstract In this work, we analyze the secrecy rate in a cooperative network, where a source node is ...
International audience—Network Coding is a key strategy for meeting the needs of information technol...
In wireless networks, the bandwidth is considered one of the most scarce and valuable resources. The...
Physical layer security has been recently recognized as a promising new design paradigm to provide s...
In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, cons...