Secure Communication Over Parallel Relay Channel
نویسندگان
چکیده
منابع مشابه
Secure communication over fully quantum Gel'fand-Pinsker wiretap channel
In this work we study the problem of secure communication over a fully quantum Gel’fand-Pinsker channel. The best known achievability rate for this channel model in the classical case was proven by Goldfeld, Cuff and Permuter in [1]. We generalize the result of [1]. One key feature of the results obtained in this work is that all the bounds obtained are in terms of error exponent. We obtain our...
متن کاملSecure Communication in Two-Way Relay Networks with Channel Estimation Errors
In this paper, we investigate the secrecy outage probability (SOP) for the cooperative amplify-and-forward (AF) two-way relay networks (TWRN) with channel estimation (CE) errors under Rayleigh fading channels. In the proposed system, two sources simultaneously broadcast their respective information to all the relays firstly. Then, the optimal relay performs AF protocol on the received signals s...
متن کاملDifferential Relay Strategies Over Downlink Channel in Two-User Cooperative Communication System
In this paper, we propose two differential relaying strategies; Active User Strategy (AUS) and Passive Users Relaying Strategy (PURS), which could be used by the base-station to transmit data of two users over downlink channels in a two-user cooperative communication network. Differential schemes are used so the users do not require the knowledge of channel gains for decoding of their data. The...
متن کاملOutage Probability of Cooperative Communication Network with Relay Selection Over Nakagami-m Fading Channel
Cooperative diversity uses relays which assist source destination transmissions to reduce link outage rates in multipath fading environments. In this paper, an Amplify-and-Forward (AAF) cooperative communication system over Nakagami-m fading channel is considered where a source node communicates with a destination node directly and indirectly (through multiple relays). Nakagami-m fading channel...
متن کاملTwo-hop Secure Communication Using an Untrusted Relay
We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted rel...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2012
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2012.2185493