2017
DOI: 10.1109/tvt.2016.2572960
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communication via a Wireless Energy Harvesting Untrusted Relay

Abstract: Abstract-The broadcast nature of the wireless medium allows unintended users to eavesdrop the confidential information transmission. In this regard, we investigate the problem of secure communication between a source and a destination via a wireless energy harvesting untrusted node which acts as a helper to relay the information; however, the source and destination nodes wish to keep the information confidential from the relay node. To realize the positive secrecy rate, we use destination-assisted jamming. Bei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
128
0
3

Year Published

2017
2017
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 115 publications
(131 citation statements)
references
References 63 publications
0
128
0
3
Order By: Relevance
“…We assume that the jamming signal can readily be cancelled off since it is known to the destination. 12,16,17 Secure transmission performance…”
Section: Energy Harvesting and Information Processingmentioning
confidence: 99%
See 1 more Smart Citation
“…We assume that the jamming signal can readily be cancelled off since it is known to the destination. 12,16,17 Secure transmission performance…”
Section: Energy Harvesting and Information Processingmentioning
confidence: 99%
“…Different from Kalamkar and Banerjee, 17 we adopt the fixed-rate transmission scheme to meet the security and reliability requirements, where the security is quantified in terms of the SOP, the reliability is quantified in terms of the connection outage probability (COP). The main contributions of this article are summarized as follows:…”
Section: Introductionmentioning
confidence: 99%
“…By exploiting the coding techniques as well as physical properties of wireless channels, PHY layer security has a great potential to achieve "perfect secrecy" and is identified as a significant complement to traditional cryptographic techniques [8]. As introduced in [9,10], the weighted fractional Fourier transform (WFRFT) is performed as a new paradigm for PHY layer security enhancement.…”
Section: Introductionmentioning
confidence: 99%
“…In the presence of an external ER, the work in Chen et al 14 examined secure communication between the source and the destination via an EH relay with multiple antennas while the authors in Xing et al 15 studied the secrecy performance of source-destination communication via multiple EH relays. [17][18][19][20][21][22][23] In Huang et al, 17 the authors investigated the secrecy performance of the communication via a multiple antenna untrusted relay in terms of secrecy outage probability. In cases without ERs, the transmission from the source to the destination is still compromised when one may wish to keep the source-destination communication confidential from the relay despite the help of the relay to forward the information.…”
Section: Introductionmentioning
confidence: 99%