Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Communications for Two-Way Relay Networks Via Relay Chatting

In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is proposed. Specifically, the proposed scheme selects a best relay that maximize the sum mutual information among the sources to forward the sources’ signals using an amplify-and-for...

متن کامل

Robust Beamforming for Ofdm Modulated Two-way Mimo Relay Network

Robust Beamforming for OFDM Modulated Two-Way MIMO Relay Network. (May 2012) Jianwei Zhou, B.S., University of Hawaii at Manoa Chair of Advisory Committee: Shuguang Cui This thesis studies a two-way relay network (TWRN), which consists of two single antenna source nodes and a multi-antenna relay node. The source nodes exchange information via the assistance of the relay node in the middle. The ...

متن کامل

Beamforming for Underlay Two - Way Relay Networks

Although underlay networks mitigate the dual problems of spectrum congestion and spectrum under-utilization, the bi-directional (primary-to-secondary and secondaryto-primary) interference issues must be addressed to improve their reliability, coverage and capacity. To address these problems, this thesis investigates beamforming and two-way relaying. Specifically, the two underlay configurations...

متن کامل

Energy Harvesting Based Secure Two-Way Communication Using an Untrusted Relay

In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer. We take into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ) scenarios. Based on the time switching (TS) architecture at the relay, the data transmission is...

متن کامل

Two-hop Secure Communication Using an Untrusted Relay

We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted rel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Signal Processing

سال: 2014

ISSN: 1053-587X,1941-0476

DOI: 10.1109/tsp.2014.2307276