2023
DOI: 10.1109/tifs.2023.3266928
|View full text |Cite
|
Sign up to set email alerts
|

Joint Secure Transceiver Design for an Untrusted MIMO Relay Assisted Over-the-Air Computation Networks With Perfect and Imperfect CSI

Abstract: In this paper, we investigate the physical layer security of an untrusted relay assisted over-the-air computation (AirComp) network, where each node is equipped with multiple antennas and the relay is operated in an amplify-and-forward mode. The relay receives the data from each sensor and sends them to the access point (AP) in the first and second time slot, respectively. The AP applies artificial noise (AN) to protect the aggregation of sensors' data from being wiretapped by the untrusted relay in the first … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 61 publications
0
3
0
Order By: Relevance
“…Moreover, CAP acts as a potential eavesdropper but does not make any malicious attack in our network. In this scenario, the CAP must strictly implement the amplify-and-forward operation and forwards the amplified version of the received signal without modification [8]. We denote the channels from sensor N i (i ∈ K), PU j ( j ∈ J ) to CAP and from CAP to PU j as f i ∈ C Mr×1 , H j ∈ C Mr×M and G j ∈ C M×Mr , respectively, where K {1, .…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, CAP acts as a potential eavesdropper but does not make any malicious attack in our network. In this scenario, the CAP must strictly implement the amplify-and-forward operation and forwards the amplified version of the received signal without modification [8]. We denote the channels from sensor N i (i ∈ K), PU j ( j ∈ J ) to CAP and from CAP to PU j as f i ∈ C Mr×1 , H j ∈ C Mr×M and G j ∈ C M×Mr , respectively, where K {1, .…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
“…Furthermore, based on (1), the achievable information rate for attempting to decode x 1 and x 2 at CAP is given by [8]…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
“…Thus, secure data aggregation is a critical issue for the AirComp systems. The security design schemes for single-carrier AirComp systems have been studied in [5][6][7]. However, to the best of our knowledge, the research on a security optimization scheme for the multi-carrier (OFDMA) AirComp systems is still missing.…”
mentioning
confidence: 99%