2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2018
DOI: 10.1109/pimrc.2018.8580699
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Performance for Multiple Untrusted Relay Networks Using Destination-Based Jamming with Direct Link

Abstract: We propose a destination-based jamming scheme for cooperative networks with multiple untrusted amplify-and-forward relays, in which the destination operates in full-duplex mode so as to enable simultaneous reception of the information coming directly from the source and the transmission of jamming signals to the untrusted relay. An approximate analytical expression for the secrecy outage probability, under the effect of residual self-interference at the destination, is presented. The developed analysis is veri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 11 publications
(11 reference statements)
0
9
0
2
Order By: Relevance
“…2 illustrates the secrecy outage probability versus the transmitted system SNR , for different number of relays. Simulations were performed by considering different values of the correlation factor and , as well as the case with perfect CSI presented in [13]. As expected, the case does not present impact regarding the value of as no relay selection process is performed.…”
Section: Numerical Results and Discussionmentioning
confidence: 90%
See 4 more Smart Citations
“…2 illustrates the secrecy outage probability versus the transmitted system SNR , for different number of relays. Simulations were performed by considering different values of the correlation factor and , as well as the case with perfect CSI presented in [13]. As expected, the case does not present impact regarding the value of as no relay selection process is performed.…”
Section: Numerical Results and Discussionmentioning
confidence: 90%
“…In certain types of networks, such as heterogeneous networks, where the nodes have different levels of clearance, the relay node may try to extract useful information from the legitimate communication between source and relay to use it for its own benefit. In light of this, recently, many works have addressed scenarios considering untrusted relay nodes [9]- [13]. In particular, in [9], a source-based jamming technique was evaluated in combination with power allocation to improve the security in a network with one untrusted relay and the presence of direct link between source and destination.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations