2019
DOI: 10.1109/tvt.2018.2882178
|View full text |Cite
|
Sign up to set email alerts
|

User-Pair Selection in Multiuser Cooperative Networks With an Untrusted Relay

Abstract: This paper investigates the physical-layer security of an amplify-and-forward wireless cooperative network where N source nodes communicate with their corresponding destination nodes under the help of an untrusted relay. In each slot only one user-pair is scheduled to transmit the information, and the destination aided cooperative jamming is adopted to protect information from being intercepted by the untrusted relay. Three user-pair selection schemes have been proposed for the considered system, namely opport… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(21 citation statements)
references
References 43 publications
0
15
0
Order By: Relevance
“…2) Untrusted user case: all users are untrustworthy so each user receives data with considering all other users as the potential eavesdroppers [14]- [16]. 3) Untrusted relay case: when the source communicates with users by relay-assisted, there exists another research scenario of physical layer security, where the relay is assumed to be untrustworthy and act as an eavesdropper [17]- [27].…”
Section: Introductionmentioning
confidence: 99%
“…2) Untrusted user case: all users are untrustworthy so each user receives data with considering all other users as the potential eavesdroppers [14]- [16]. 3) Untrusted relay case: when the source communicates with users by relay-assisted, there exists another research scenario of physical layer security, where the relay is assumed to be untrustworthy and act as an eavesdropper [17]- [27].…”
Section: Introductionmentioning
confidence: 99%
“…As an alternative, in [15], an extra user is selected to transmit artificial noise to reduce the secrecy outage probability of the chosen user. In [16], in order to protect wireless transmissions of scheduled user‐pair, the destination‐aided collaborative jamming is designed. In [17], a user having the maximal secrecy rate will be selected to access the AP, and the AP may utilise multiple antennas to transmit artificial noise to the illegal users.…”
Section: Introductionmentioning
confidence: 99%
“…Although extensive research efforts have been devoted to the PLS in the multi‐terminal wireless networks, less attention has been paid to multi‐terminal multi‐mode wireless scenarios. In this paper, differing from [15–21], we explore the PLS of a wireless network consisting of multiple smart terminals relying on coexisting between the licensed modes and the unlicensed modes, in the presence of an eavesdropper. The main contributions of this paper are summarised as follows.…”
Section: Introductionmentioning
confidence: 99%
“…In this scenario, the source and destination are equipped with large‐scale multiple antennas. He et al introduced the cooperative jamming technique into an untrusted network with N source‐destination pairs and presented user‐pair selection schemes. For Nakagami‐ m fading, the impact of eavesdropping on SOP performance for AF relaying with an untrusted relay was investigated in Ding et al…”
Section: Introductionmentioning
confidence: 99%