2020
DOI: 10.1109/tifs.2020.3001733
|View full text |Cite
|
Sign up to set email alerts
|

Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(21 citation statements)
references
References 39 publications
0
21
0
Order By: Relevance
“…The shortage of security features in these protocols has a different influence on the smart grids' situation. For instance, protocols without encryption can make the data in transit vulnerable to eavesdropping, which results in various attacks, e.g., injection of false data because of the lack of authentication [143] or the implication of customers' usage patterns [144]. Indeed, it is also conceivable to inject false data, resulting in decisions based on false information [145], or inject the network with false packets that target to flood it, resulting in a DoS attack.…”
Section: Cp Vulnerabilities In Smart Grid a The Vulnerabilitiesmentioning
confidence: 99%
“…The shortage of security features in these protocols has a different influence on the smart grids' situation. For instance, protocols without encryption can make the data in transit vulnerable to eavesdropping, which results in various attacks, e.g., injection of false data because of the lack of authentication [143] or the implication of customers' usage patterns [144]. Indeed, it is also conceivable to inject false data, resulting in decisions based on false information [145], or inject the network with false packets that target to flood it, resulting in a DoS attack.…”
Section: Cp Vulnerabilities In Smart Grid a The Vulnerabilitiesmentioning
confidence: 99%
“…We can easily solve the optimization problem by using Lagrange dual method. The Lagrange dual function of the problem (18) is…”
Section: B Source Power Allocationmentioning
confidence: 99%
“…In the untrusted relay case, the authors in [17] proposed a signal-to-noise ratio (SNR) based power allocation scheme to improve system secrecy rate using a single untrusted relay node with single/multiple antennas, and artificial noise emitted by source was employed to combat untrusted relay. The full-duplex untrusted relay in multi-input multi-output (MIMO) scenario was studied in [18] and the authors used secure beamforming to enhance security performance. The VOLUME 4, 2016 authors in [19] considered the optimal power allocation for secure transmission under an untrusted relay, where useraid cooperative jamming was employed to achieve positive secrecy rate.…”
Section: Introductionmentioning
confidence: 99%
“…Besides energy harvesting, full-duplex technology for cooperative relaying systems also attracted significant attention from researchers [ 22 24 ]. In [ 22 ], the authors considered a novel system model consisting of an energy-harvesting full-duplex (FD) relay and a jammer in the presence of an eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…Then, they derived closed-form expressions of the throughput, OP, and symbol error rate (SER). In contrast to [ 22 , 23 ] that only investigated the single-input single-output (SISO) system, Zhao et al [ 24 ] studied physical layer security for a full-duplex multiple-input multiple-output system.…”
Section: Introductionmentioning
confidence: 99%