Sharma et al., 2020 - Google Patents
Secure communication with energy harvesting multiple half-duplex DF relays assisted with jammingSharma et al., 2020
View PDF- Document ID
- 7953666935711331549
- Author
- Sharma S
- Dhar Roy S
- Kundu S
- Publication year
- Publication venue
- Wireless Networks
External Links
Snippet
Physical layer security in relay based cooperative networks is a promising approach to maintain confidentiality of information. In this paper, secrecy performance of a dual hop network, with multiple energy harvesting decode and forward (DF) relays, has been …
- 238000003306 harvesting 0 title abstract description 55
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/155—Ground-based stations
- H04B7/15528—Control of operation parameters of a relay station to exploit the physical medium
- H04B7/15542—Selecting at relay station its transmit and receive resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cumanan et al. | Physical layer security jamming: Theoretical limits and practical designs in wireless networks | |
Ha et al. | Outage performance of energy harvesting DF relaying NOMA networks | |
Sun et al. | Transceiver design for cooperative non‐orthogonal multiple access systems with wireless energy transfer | |
Maji et al. | Physical layer security in cognitive radio network with energy harvesting relay and jamming in the presence of direct link | |
Tran et al. | Performance analysis of power-splitting relaying protocol in SWIPT based cooperative NOMA systems | |
Maji et al. | Secrecy outage of a cognitive radio network with selection of energy harvesting relay and imperfect CSI | |
Hu et al. | Secrecy energy efficiency in wireless powered heterogeneous networks: A distributed ADMM approach | |
Cao et al. | Physical-Layer Security for Intelligent-Reflecting-Surface-Aided Wireless-Powered Communication Systems | |
Xu et al. | Opportunistic relay selection improves reliability–reliability tradeoff and security–reliability tradeoff in random cognitive radio networks | |
Li et al. | Secure analysis of multi‐antenna cooperative networks with residual transceiver HIs and CEEs | |
Sharma et al. | Secure communication with energy harvesting multiple half-duplex DF relays assisted with jamming | |
Hung et al. | Secrecy outage performance of multi-hop leach networks using power beacon aided cooperative jamming with jammer selection methods | |
Jiang et al. | Security‐reliability tradeoff for friendly jammer aided multiuser scheduling in energy harvesting communications | |
Ha et al. | Secure cognitive reactive decode-and-forward relay networks: With and without eavesdropper | |
Cuong et al. | Analysis of secrecy outage performance for full duplex NOMA relay systems with appearance of multiple eavesdroppers | |
Sarker et al. | Secure wireless multicasting through AF-cooperative networks with best-relay selection over generalized fading channels | |
Sharma et al. | Secrecy outage of a multi‐relay cooperative communication network with accumulation of harvesting energy at relays | |
Zarrabi et al. | EE‐RS and PA for untrusted relay network at high signal‐to‐noise ratio regime | |
Maji et al. | Secrecy and throughput performance of an energy harvesting hybrid cognitive radio network with spectrum sensing | |
Ding et al. | Relay selection for secrecy improvement in cognitive amplify‐and‐forward relay networks against multiple eavesdroppers | |
Bhatt et al. | Performance off cluster‐based multi‐hop underlay networks with energy harvesting nodes | |
Yin et al. | Secure energy harvesting communications with relay selection over Nakagami-m fading channels | |
Wu et al. | Multihop capability analysis in wireless information and power transfer multirelay cooperative networks | |
Lu et al. | Proactive eavesdropping in UAV-aided mobile relay systems | |
Wang et al. | Energy efficient relay networks with wireless power transfer from a multi‐antenna base station |