16th International Conference on Advanced Communication Technology 2014
DOI: 10.1109/icact.2014.6778969
|View full text |Cite
|
Sign up to set email alerts
|

Jammer selection for secure two-way DF relay communications with imperfect CSI

Abstract: Abstract-This paper investigates jammer selection in a twoway decode-and-forward (DF) relay network with imperfect channel state information (CSI). The proposed scheme enables an selection of one conventional relay and two jamming nodes to enhance communication security against eavesdropper. The conventional relay assists two sources to exchange their data via a DF protocol. The two jamming nodes are used to create interference signals to confuse the eavesdropper. Furthermore, the asymptotic performance of pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 8 publications
(5 reference statements)
0
3
0
Order By: Relevance
“…By using (11) and (12), the LR expressions with respect to x can be calculated for the CEE and F-D cases as in (13) and (14), respectively…”
Section: Fd Casementioning
confidence: 99%
See 1 more Smart Citation
“…By using (11) and (12), the LR expressions with respect to x can be calculated for the CEE and F-D cases as in (13) and (14), respectively…”
Section: Fd Casementioning
confidence: 99%
“…Likewise, Cao et al [11] compared the conventional round-robin-based scheduling and a joint source-relay selection strategy, based on maximising the instantaneous capacity, for improving the PHY security. Wang et al [12] proposed a jammer selection strategy with imperfect CSI, which is based on selecting the minimum secrecy rate and maximise it, to enhance the system security against the eavesdropper. Sun et al [13] considers a HD-based two-way relaying (TWR) system model structure in the presence of a single eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…In Phase 1, the two source nodes transmits data to relays; in Phase 2, the relays retransmit a weighted version of the data they heard in Phase 1 to their corresponding destination nodes. We use the amplify-and-forward (AF) protocol here, while in some papers, decode-and-forward (DF) protocol was considered [12], [13].…”
Section: Introductionmentioning
confidence: 99%