We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external "good samaritan" node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it fro...
This paper studies cooperative transmission for securing a two-hop network where the eavesdropper ca...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
We consider a source-destination pair that can only communicate through an untrusted intermediate re...
Abstract—In this paper, we consider a two-way relay network where two sources can communicate only t...
In this paper, we consider communication on a two-hop channel in which a source wants to send inform...
In this paper, we consider a two-way relay network where two sources can communicate only through an...
In this paper, we consider a two-way relay network where two sources can communicate only through an...
In this paper, we consider a two-way relay network where two sources can communicate only through an...
Abstract—We investigate a relay network where the source and destination select one relay out of a g...
This paper investigates the achievable secrecy regions when employing a friendly jammer in a coopera...
This paper investigates the achievable secrecy regions when employing a friendly jammer in a coopera...
In this paper, we consider a two-way relay system where the two sources can only communicate through...
In this paper, we consider a two-way relay system where the two sources can only communicate through...
In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, cons...
This paper studies cooperative transmission for securing a two-hop network where the eavesdropper ca...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
We consider a source-destination pair that can only communicate through an untrusted intermediate re...
Abstract—In this paper, we consider a two-way relay network where two sources can communicate only t...
In this paper, we consider communication on a two-hop channel in which a source wants to send inform...
In this paper, we consider a two-way relay network where two sources can communicate only through an...
In this paper, we consider a two-way relay network where two sources can communicate only through an...
In this paper, we consider a two-way relay network where two sources can communicate only through an...
Abstract—We investigate a relay network where the source and destination select one relay out of a g...
This paper investigates the achievable secrecy regions when employing a friendly jammer in a coopera...
This paper investigates the achievable secrecy regions when employing a friendly jammer in a coopera...
In this paper, we consider a two-way relay system where the two sources can only communicate through...
In this paper, we consider a two-way relay system where the two sources can only communicate through...
In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, cons...
This paper studies cooperative transmission for securing a two-hop network where the eavesdropper ca...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...