Abstract In this paper, the secrecy outage performance of a three-node amplify-and-forward relay network with an untrustworthy relay is investigated. To enable a secure transmission, we consider a destination-based jamming technique to prevent the relay from successfully decoding the secret messages between the source and the destination. In addition, the relay is assumed to be an energy-constrained device, thus being first energized by the source in order to be able to retransmit the information to the destination. In doing so, a time switching-based simultaneous wireless information and power transfer scheme is used. A closed-form asymptotic expression for the secrecy outage probability is derived in order to obtain a tight approximation...
Physical layer security (PLS) has been shown to hold promise as a new paradigm for securing wireless...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
Abstract This work investigates the secrecy outage performance of a dual-hop relaying network with a...
This paper studies cooperative transmission for securing a two-hop network where the eavesdropper ca...
Abstract—We investigate a relay network where the source can potentially utilize an unauthenticated ...
We propose a jam-then-harvest protocol for dual-hop cooperative networks with an untrusted relay, wh...
Abstract This paper investigates the secrecy performance of a power splitting-based simultaneous wi...
In this paper, the secrecy performance of the two-user simultaneous wireless information and power t...
In this paper, the secrecy performance of the two-user simultaneous wireless information and power t...
This paper analyzes the ergodic secrecy capacity of an energy-constrained multiple-antennas amplify-...
This paper analyzes the ergodic secrecy capacity of an energy-constrained multiple-antennas amplify...
Abstract Recently, three useful secrecy metrics based on the partial secrecy regime were proposed t...
This paper studies the secrecy performance of an energy-harvesting relaying system in the presence o...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
Physical layer security (PLS) has been shown to hold promise as a new paradigm for securing wireless...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
Abstract This work investigates the secrecy outage performance of a dual-hop relaying network with a...
This paper studies cooperative transmission for securing a two-hop network where the eavesdropper ca...
Abstract—We investigate a relay network where the source can potentially utilize an unauthenticated ...
We propose a jam-then-harvest protocol for dual-hop cooperative networks with an untrusted relay, wh...
Abstract This paper investigates the secrecy performance of a power splitting-based simultaneous wi...
In this paper, the secrecy performance of the two-user simultaneous wireless information and power t...
In this paper, the secrecy performance of the two-user simultaneous wireless information and power t...
This paper analyzes the ergodic secrecy capacity of an energy-constrained multiple-antennas amplify-...
This paper analyzes the ergodic secrecy capacity of an energy-constrained multiple-antennas amplify...
Abstract Recently, three useful secrecy metrics based on the partial secrecy regime were proposed t...
This paper studies the secrecy performance of an energy-harvesting relaying system in the presence o...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
Physical layer security (PLS) has been shown to hold promise as a new paradigm for securing wireless...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...