Physical layer security in cooperative AF relaying networks with direct links over mixed Rayleigh and double-Rayleigh fading channels

A Pandey, S Yadav - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a dual-hop cooperative relaying
network, where a source node communicates with a destination node via an amplify-and …

Secrecy outage probability analysis of friendly jammer selection aided multiuser scheduling for wireless networks

B Li, Y Zou, J Zhou, F Wang, W Cao… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we study a multiuser uplink network consisting of one base station (BS),
multiple users and one eavesdropper (E), where the users are intended to transmit their …

Buffer‐aided relaying: a survey on relay selection policies

M El‐Rajab, C Abou‐Rjeily, R Kfouri - IET Communications, 2020 - Wiley Online Library
Ever since the idea of buffers was incorporated in wireless communications, buffer‐aided
relaying has become an emerging breakthrough in the world of transmitting and receiving …

Deep neural network-based clustering technique for secure IIoT

A Mukherjee, P Goswami, L Yang… - Neural Computing and …, 2020 - Springer
Abstract The advent of Industrial Internet of Things (IIoT) has determined the proliferation of
smart devices connected to the Internet and injected a vast amount of data into it, which may …

Secure energy harvesting relay networks with unreliable backhaul connections

C Yin, HT Nguyen, C Kundu, Z Kaleem… - IEEE …, 2018 - ieeexplore.ieee.org
Wireless backhaul is a cost-effective and flexible alternative to wired backhaul, yet it suffers
from unreliability. This paper studies the secrecy performance of a relay network with such …

Performance evaluation of amplify‐and‐forward relaying cooperative vehicular networks under physical layer security

A Pandey, S Yadav - Transactions on Emerging …, 2018 - Wiley Online Library
In this paper, we address the physical layer security of a cooperative vehicular network in
the presence of a passive eavesdropper vehicle, where the communication from a fixed …

Secure Cooperative Half-Duplex Cognitive Radio Networks With -th Best Relay Selection

MN Nguyen, NP Nguyen, DB Da Costa… - IEEE …, 2017 - ieeexplore.ieee.org
In this paper, we study the secrecy performance of a half-duplex cognitive relay network in
the presence of multiple eavesdroppers and multiple primary users. In particular, generic K …

Buffer-aided secure relay networks with SWIPT

J Ren, X Lei, PD Diamantoulakis… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this paper, we propose the use of data and energy buffering in wireless powered relays,
while we also design scheduling schemes, with the aim to increase the secrecy throughput …

Buffer-aided two-hop secure communications with power control and link selection

J Wan, D Qiao, HM Wang, H Qian - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper investigates the link selection policy for secure communications over a buffer-
aided two-hop communication link. It is assumed that a source wishes to send information to …

Joint user association and power allocation for millimeter-wave ultra-dense networks

HT Nguyen, H Murakami, K Nguyen, K Ishizu… - Mobile Networks and …, 2020 - Springer
To meet the demand of various high-speed data rate services as well as serving an
exponential increment of mobile devices, millimeter-Wave (mmWave) communication in …