In this paper, we propose secure relaying transmission protocols using rateless codes, where a source sends encoded packets to two intended destinations via help of intermediate relays. Employing non-orthogonal multiple access, two encoded packets can be sent to the destinations at the same time. In addition, two partial relay selection methods are studied to enhance reliability of the data transmission at the first and second hops. For protecting the source-relay and relay-destination transmission against an eavesdropper, cooperative jamming technique is employed. Particularly, in the first phase of each data transmission cycle, the remaining relays (except the selected relay) are used to transmit artificial noise on the eavesdropper, and ...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
Physical-layer security is emerging as a promising paradigm of securing wireless communications agai...
The broadcast characteristic of a wireless networks which is exploited in cooperative communications...
To enhance the secrecy of wireless transmission, we propose a cooperative user relaying NOMA scheme,...
In this paper, we evaluate system performances of a multi-hop relay protocol with presence of an act...
Abstract—We investigate a relay network where the source can potentially utilize an unauthenticated ...
In this paper, we evaluate system performances of a multi-hop relay protocol with presence of an act...
This paper studies cooperative transmission for securing a two-hop network where the eavesdropper ca...
Abstract In this paper, the secrecy outage performance of a three-node amplify-and-forward relay ne...
Three relay selection techniques, aiming at achieving secure non-orthogonal multiple access in coope...
In this work, the secrecy of a typical wireless cooperative dual‐hop non‐orthogonal multiple access ...
In this paper, we propose a rateless codes-based communication protocol to provide security for wire...
In this paper, we study the secrecy outage probability (SOP)and the strictly positive secrecy capaci...
hree relay selection techniques, aiming at achieving secure non-orthogonal multiple access in cooper...
© 1967-2012 IEEE. This paper analyzes the secrecy capacity of a cooperative relaying system using no...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
Physical-layer security is emerging as a promising paradigm of securing wireless communications agai...
The broadcast characteristic of a wireless networks which is exploited in cooperative communications...
To enhance the secrecy of wireless transmission, we propose a cooperative user relaying NOMA scheme,...
In this paper, we evaluate system performances of a multi-hop relay protocol with presence of an act...
Abstract—We investigate a relay network where the source can potentially utilize an unauthenticated ...
In this paper, we evaluate system performances of a multi-hop relay protocol with presence of an act...
This paper studies cooperative transmission for securing a two-hop network where the eavesdropper ca...
Abstract In this paper, the secrecy outage performance of a three-node amplify-and-forward relay ne...
Three relay selection techniques, aiming at achieving secure non-orthogonal multiple access in coope...
In this work, the secrecy of a typical wireless cooperative dual‐hop non‐orthogonal multiple access ...
In this paper, we propose a rateless codes-based communication protocol to provide security for wire...
In this paper, we study the secrecy outage probability (SOP)and the strictly positive secrecy capaci...
hree relay selection techniques, aiming at achieving secure non-orthogonal multiple access in cooper...
© 1967-2012 IEEE. This paper analyzes the secrecy capacity of a cooperative relaying system using no...
This study investigates the security of the two-way relaying system with untrusty relay nodes. Coope...
Physical-layer security is emerging as a promising paradigm of securing wireless communications agai...
The broadcast characteristic of a wireless networks which is exploited in cooperative communications...