Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay
نویسندگان
چکیده
منابع مشابه
Secure Communications for Two-Way Relay Networks Via Relay Chatting
In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is proposed. Specifically, the proposed scheme selects a best relay that maximize the sum mutual information among the sources to forward the sources’ signals using an amplify-and-for...
متن کاملRobust Beamforming for Ofdm Modulated Two-way Mimo Relay Network
Robust Beamforming for OFDM Modulated Two-Way MIMO Relay Network. (May 2012) Jianwei Zhou, B.S., University of Hawaii at Manoa Chair of Advisory Committee: Shuguang Cui This thesis studies a two-way relay network (TWRN), which consists of two single antenna source nodes and a multi-antenna relay node. The source nodes exchange information via the assistance of the relay node in the middle. The ...
متن کاملBeamforming for Underlay Two - Way Relay Networks
Although underlay networks mitigate the dual problems of spectrum congestion and spectrum under-utilization, the bi-directional (primary-to-secondary and secondaryto-primary) interference issues must be addressed to improve their reliability, coverage and capacity. To address these problems, this thesis investigates beamforming and two-way relaying. Specifically, the two underlay configurations...
متن کاملEnergy Harvesting Based Secure Two-Way Communication Using an Untrusted Relay
In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer. We take into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ) scenarios. Based on the time switching (TS) architecture at the relay, the data transmission is...
متن کاملTwo-hop Secure Communication Using an Untrusted Relay
We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted rel...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Signal Processing
سال: 2014
ISSN: 1053-587X,1941-0476
DOI: 10.1109/tsp.2014.2307276