2017
DOI: 10.1155/2017/2192606
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming

Abstract: An untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT) scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, which sends the message by using its harvested energy from the source nodes. Specifically, we classify the intermediate relay as an eavesdropper into two modes: active eavesdropper and nonactive eavesdropper, depending… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 30 publications
(43 reference statements)
0
6
0
Order By: Relevance
“…In contrast, for the case of imperfect CSI, a suboptimal rank algorithm was provided. Xiao et al in [272] studied two eavesdropping conditions of untrusted relay, i.e. active eavesdropping and non-active eavesdropping.…”
Section: B Joint Power Allocationmentioning
confidence: 99%
“…In contrast, for the case of imperfect CSI, a suboptimal rank algorithm was provided. Xiao et al in [272] studied two eavesdropping conditions of untrusted relay, i.e. active eavesdropping and non-active eavesdropping.…”
Section: B Joint Power Allocationmentioning
confidence: 99%
“…Therefore, deploying a wireless‐powered relay or even multiple relays might be regarded as a promising solution for successful and energy efficient end‐to‐end transmission. It is also worth noting that the lack of direct link between source and destination is a widely adopted and valid assumption in numerous real‐world wireless communication scenarios based on relaying [10, 15, 19, 23].…”
Section: System Model and Assumptionsmentioning
confidence: 99%
“…We also assume that all the network nodes are configured with a single antenna and operate in half‐duplex mode with the same frequency band as in [19, 23–25]. [Note that this work can be extended to consider large‐scale antennas at every node based on the required application, which further eventuates considering correlated channels within each link, due to the utilisation of multiple antennas and even correlated shadowing channels between nodes as in [28, 29], especially when it comes to the application of wireless EH wherein network nodes should be close enough to make a promising EH performance.…”
Section: System Model and Assumptionsmentioning
confidence: 99%
See 2 more Smart Citations