2017
DOI: 10.3390/e19080384
|View full text |Cite
|
Sign up to set email alerts
|

Securing Relay Networks with Artificial Noise: An Error Performance-Based Approach

Abstract: Abstract:We apply the concept of artificial and controlled interference in a two-hop relay network with an untrusted relay, aiming at enhancing the wireless communication secrecy between the source and the destination node. In order to shield the square quadrature amplitude-modulated (QAM) signals transmitted from the source node to the relay, the destination node designs and transmits artificial noise (AN) symbols to jam the relay reception. The objective of our considered AN design is to degrade the error pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 56 publications
0
16
0
Order By: Relevance
“…A 0 , a 3 , A j and a j , j = 1, 2 are defined below (11). It is solved optimally by the SDR method.…”
Section: Iterations Applying the Line Search Techniquementioning
confidence: 99%
See 1 more Smart Citation
“…A 0 , a 3 , A j and a j , j = 1, 2 are defined below (11). It is solved optimally by the SDR method.…”
Section: Iterations Applying the Line Search Techniquementioning
confidence: 99%
“…The secure communication is managed through multiple-antenna system [1][2][3][4][5][6][7][8][9] or node cooperation [10,11]. Research works on node cooperation are well explored.…”
Section: Introductionmentioning
confidence: 99%
“…Wireless services, despite broad popularity, find it challenging to shield transmitted signals from eavesdroppers and are vulnerable to being overheard on the communication link. Therefore, users' privacy concerns and information security issues have received more and more considerable attention (see, e.g., [1][2][3][4][5], and the references therein).…”
Section: Introductionmentioning
confidence: 99%
“…In [ 9 ], the cooperative jammers harvest energy transmitted by a source and use it to generate artificial noise to jam the Eves cognitive Internet-of-Things networks, in which an auction framework that formulates the jammer selection and the power allocation together is also provided. In an amplify-and-forward relay network, the destination can work as a friendly jammer by generating artificial noise in the first phase to prevent the possibly untrusted relay from decoding the signal [ 10 ].…”
Section: Introductionmentioning
confidence: 99%