2018
DOI: 10.1109/tvt.2018.2848648
|View full text |Cite
|
Sign up to set email alerts
|

Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer

Abstract: In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer. We take into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ) scenarios. Based on the time switching (TS) architecture at the relay, the data transmission is done in three phases. In the first phase, both the energy-starved nodes, the untrustworthy relay and the jammer, are … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
62
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 68 publications
(62 citation statements)
references
References 39 publications
(86 reference statements)
0
62
0
Order By: Relevance
“…In order to obtain a closed-form lower-bound expression for E{C S }, one can write, following the Jensen's inequality, as [31] (see (D.1)). In (D.1), the term E{ln(γ A →B )} is further calculated as…”
Section: Appendix D Derivation Of Lower-bounded Asrmentioning
confidence: 99%
“…In order to obtain a closed-form lower-bound expression for E{C S }, one can write, following the Jensen's inequality, as [31] (see (D.1)). In (D.1), the term E{ln(γ A →B )} is further calculated as…”
Section: Appendix D Derivation Of Lower-bounded Asrmentioning
confidence: 99%
“…The secrecy performance of TWR relay networks has been widely investigated. [23][24][25][26][27] In particular, Long et al 23 have investigated the secrecy performance of an amplify-and-forward (AF)-based TWR network under an eavesdropping attack. A wireless-powered TWR model for secure communication in the presence of multiple eavesdroppers has been investigated by Lee et-al.…”
Section: Introductionmentioning
confidence: 99%
“…24 Zhang et-al 25 have investigated physical-layer security for two-way untrusted relaying with friendly jammers. The secrecy performance of secure TWR networks with a wireless-powered AF untrusted relay under the friendly jamming and Gaussian noise jamming scenarios has been studied by Mamaghani et al 26 Moreover, Fu et al 27 have evaluated the symbol error rate and optimal power allocation for secure decode-and-forward (DF)-based TWR networks. To further improve the secrecy performance of TWR systems, various multirelay and/or multiantenna scenarios, and various opportunistic transmission schemes were investigated in the literature.…”
Section: Introductionmentioning
confidence: 99%
“…1,6,[9][10][11][18][19][20][24][25][26][27] Two-way relaying is another type of cooperation, which was investigated in recent works. 28,29 Authors in a previous work 28 studied the problem of transmit power allocation for a network of two terminals with multiantenna and a twoway relay, amplify-and-forward relays and presented two different solutions. The first one involved maximizing the sum rate to a total power constraint, while the second was maximizing the sum rate when one of the terminals must exceed a target signal to interference plus noise ratio (SINR).…”
mentioning
confidence: 99%
“…In both cases, the resulting sum rates were a function of instantaneous channel gains. In a previous work, 29 researchers explored the physical-layer security of a two-way amplify-and-forward relaying, where two sources exchanged confidential messages using an untrustworthy multiuser decoding relay with the help of an external jammer to enhance the physical-layer security. A self-reliant cooperative wireless network was proposed in which the relay and jammer as energy-starved helping devices were powered by wireless energy of radio frequency (RF) signals.…”
mentioning
confidence: 99%