GLOBECOM 2017 - 2017 IEEE Global Communications Conference 2017
DOI: 10.1109/glocom.2017.8253999
|View full text |Cite
|
Sign up to set email alerts
|

Secure Two-Way Communication via a Wireless Powered Untrusted Relay and Friendly Jammer

Abstract: In this paper, we propose a self-dependent two-way secure communication where two sources exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay and friendly jammer (FJ). By adopting the time switching (TS) architecture at the relay, the data transmission is accomplished in three phases: Phase I) Energy harvesting by the untrusted relay and the FJ through non-information transmissions from the sources, Phase II) Information transmission by the sources and jamming transmi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 27 publications
(31 citation statements)
references
References 19 publications
0
31
0
Order By: Relevance
“…Besides, the network transmission rate R t =0.5 bits/s/Hz, the secrecy rate R s =0.2 bits/s/Hz are adopted. Further, we assume N 0 = 10 −2 , ζ = 2, energy harvesting efficiency factor ε = 0.7, ω 1 = 0.28, ω 2 = 9.61, κ m = 1, and κ M = 10 [21], [23], [28]. Also, the EPSA represents equal power allocation (i.e., λ = 0.5) and equal power splitting ratio (i.e., β = 0.5).…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
“…Besides, the network transmission rate R t =0.5 bits/s/Hz, the secrecy rate R s =0.2 bits/s/Hz are adopted. Further, we assume N 0 = 10 −2 , ζ = 2, energy harvesting efficiency factor ε = 0.7, ω 1 = 0.28, ω 2 = 9.61, κ m = 1, and κ M = 10 [21], [23], [28]. Also, the EPSA represents equal power allocation (i.e., λ = 0.5) and equal power splitting ratio (i.e., β = 0.5).…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
“…Further, in [33] the trajectory design and resource allocation of a similar system model has been explored to minimize outage probability. For security-based FD-operated UAV communications, in [34], the authors have considered an FD system with an untrusted UR, and then studied secrecy outage and average secrecy rate performance metrics, wherein the untrusted relaying refers to the case when the intermediate relaying conducts adversarial activity during communication facilitation [35]- [37]. It should be worth pointing out that FD malicious nodes can potentially pose severe security attacks compared to their passive counterparts.…”
Section: A Related Work and Motivationsmentioning
confidence: 99%
“…where the Q-function Q π (s, a) indicates the expected return starting from the state s, taking the action a and following policy π thereafter, in which Υ t is defined in (35). Likewise, the value function of a state s under a policy π is defined as the expected return when starting in state s and then following policy π afterwards, which can be given by…”
Section: Reinforcement Learning Based Solution a Preliminariesmentioning
confidence: 99%
“…The key idea behind SWIPT is that a wireless node can capture radio‐frequency (RF) signals sent by a source node and then transform them into direct current to charge the node's rechargeable battery to the extent that it further can make use of it for signal processing or information transmission (IT) [14]. In recent years, great efforts have been dedicated to the study of SWIPT for non‐security‐based [15, 16] and security‐based systems [17–26]. Nasir et al .…”
Section: Introductionmentioning
confidence: 99%
“…Finally, Tatar Mamaghani et al . [25, 26] proposed a secure two‐way energy harvesting (EH)‐based relaying communication in the presence of different types of external jammers and analysed the ergodic secrecy sum rate performance in the high signal‐to‐noise ratio (SNR) regime.…”
Section: Introductionmentioning
confidence: 99%