OFDMA-Based DF Secure Cooperative Communication With Untrusted Users

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Link Adaptive Cooperative Communication with Smart Relays for MIMO-OFDMA

Although multiple-input multiple-output (MIMO) is advantageous on orthogonal frequency division multiple access (OFDMA) system, it may not be possible that practical systems have more than two antennas because of size and cost. Therefore, cooperative communication has been recently proposed as a way to overcome this problem in slow fading wireless environment. However, if cooperative communicat...

متن کامل

An LP based Fair Subcarrier Allocation Algorithm for Cooperative OFDMA Systems with Grouped Users

Cooperative communication and orthogonal frequency division multiplexing (OFDM) technology are both promising candidates for next generation wireless communication systems. In this paper a Linear Programming (LP) based subcarrier allocation algorithm for cooperative multiuser OFDM system with grouped user is proposed. The proposed algorithm maximizes the data rate of all users over downlink und...

متن کامل

Two-hop Secure Communication Using an Untrusted Relay

We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted rel...

متن کامل

Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks

Wireless networks with the consideration of social relationships among network nodes are highly appealing for lots of important data communication services. Ensuring the security of such networks is of great importance to facilitate their applications in supporting future social-based services with strong security guarantee. This paper explores the physical layer security-based secure communica...

متن کامل

Secure Execution with Components from Untrusted Foundries

As the cost of manufacturing microprocessors continues to rise, chip makers have begun accelerating the export of fabrication capabilities to overseas locations. This trend may one day result in an adversarial relationship between system builders and chip producers. In this scenario the foundries may hide additional circuitry to not only compromise operation or leak keys, but also to enable sof...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Communications Letters

سال: 2016

ISSN: 1089-7798

DOI: 10.1109/lcomm.2016.2521655