Improving wireless physical layer security via cooperating relays

L Dong, Z Han, AP Petropulu… - IEEE transactions on …, 2009 - ieeexplore.ieee.org
Physical (PHY) layer security approaches for wireless communications can prevent
eavesdrop** without upper layer data encryption. However, they are hampered by …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009 - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

Relay selection for secure cooperative networks with jamming

I Krikidis, JS Thompson… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
This paper deals with relay selection in cooperative networks with secrecy constraints. The
proposed scheme enables an opportunistic selection of two relay nodes to increase security …

On cooperative relaying schemes for wireless physical layer security

J Li, AP Petropulu, S Weber - IEEE transactions on signal …, 2011 - ieeexplore.ieee.org
We consider a cooperative wireless network in the presence of one or more eavesdroppers,
and exploit node cooperation for achieving physical (PHY) layer based security. Two …

Destination assisted cooperative jamming for wireless physical-layer security

Y Liu, J Li, AP Petropulu - IEEE transactions on information …, 2013 - ieeexplore.ieee.org
A wireless network with one source, one destination, one eavesdropper, and multiple
decode-and-forward relays is considered. A two-slot cooperative relaying scheme is …

Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers

VNQ Bao, N Linh-Trung… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
In this paper, we study opportunistic relay selection in cooperative networks with secrecy
constraints, where a number of eavesdropper nodes may overhear the source message. To …

Secure communication with a wireless-powered friendly jammer

W Liu, X Zhou, S Durrani… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we propose using a wireless-powered friendly jammer to enable secure
communication between a source node and destination node, in the presence of an …

Opportunistic relay selection for cooperative networks with secrecy constraints

I Krikidis - IET communications, 2010 - IET
This study deals with opportunistic relay selection in cooperative networks with secrecy
constraints, where an eavesdropper node tries to overhead the source message. Previously …

Cooperative jamming for wireless physical layer security

L Dong, Z Han, AP Petropulu… - 2009 IEEE/SP 15th …, 2009 - ieeexplore.ieee.org
Cooperative jamming is an approach that has been recently proposed for improving
physical layer based security for wireless networks in the presence of an eavesdropper …

Secrecy outage of dual-hop regenerative multi-relay system with relay selection

C Kundu, S Ghose, R Bose - IEEE Transactions on Wireless …, 2015 - ieeexplore.ieee.org
Relay selection is considered to enhance the secrecy of a dual-hop regenerative multi-relay
system with an eavesdropper. Without assuming perfect decoding at the relays, the secrecy …