2011 IEEE International Conference on Communications (ICC) 2011
DOI: 10.1109/icc.2011.5962776
|View full text |Cite
|
Sign up to set email alerts
|

Joint Relay and Jammer Selection for Secure Two-Way Relay Networks

Abstract: In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, consisting of two sources, a number of intermediate nodes, and one eavesdropper, with the constraints of physical layer security. Specifically, the proposed algorithms select two or three intermediate nodes to enhance security against the malicious eavesdropper. The first selected node operates in the conventional relay mode and assists the sources to deliver their data to the corresponding destinations using an amp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
97
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 83 publications
(98 citation statements)
references
References 33 publications
0
97
0
1
Order By: Relevance
“…Historically, physical layer security in wireless networks has been intensively investigated without the direct use of location information e.g., [26]- [46]. Initialized by the seminal work of Wyner [26], physical layer security has been recognized as an alternative for cryptographic techniques due to the fact that it directly exploits the randomness of wireless channels in order to offer secure data transmissions.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Historically, physical layer security in wireless networks has been intensively investigated without the direct use of location information e.g., [26]- [46]. Initialized by the seminal work of Wyner [26], physical layer security has been recognized as an alternative for cryptographic techniques due to the fact that it directly exploits the randomness of wireless channels in order to offer secure data transmissions.…”
Section: Introductionmentioning
confidence: 99%
“…In [26]- [41], different techniques were investigated, including beamforming [27]- [34], artificial noise [35]- [37], and antenna selection [38]- [41]. When cooperative relaying is utilized, additional techniques can be deployed to boost physical layer security such as cooperative beamforming [42], relay selection [43], and cooperative jamming [44]- [46]. In the aforementioned works on physical layer security, it is commonly assumed that the average signal-to-noise ratio (SNR) of the eavesdropper is available at the transmitter.…”
Section: Introductionmentioning
confidence: 99%
“…As for secure communications, [13] develops new achievable rate regions for the two-way wiretap channel. In [14], [15], two-way amplify-and-forward relay is used for providing secure communication in conventional networks.…”
Section: Introductionmentioning
confidence: 99%
“…For the relay selection, only channel gains are needed while full channel state information (CSI) is necessary for cooperative beamforming. [13] investigates the relay and jammer selection problem in the two-way relay networks. In [14] multiple relay cooperative beamforming combined with jamming is adopted to maximize the secrecy rate.…”
Section: Introductionmentioning
confidence: 99%