Secure Two-Way Communications via Intelligent Reflecting Surfaces
نویسندگان
چکیده
In this letter, we propose to exploit an intelligent reflecting surface (IRS) secure multiuser two-way communications. Specifically, two end users simultaneously transmit their signals, where the signal of one user is exploited as information jamming disrupt reception other user’s at eavesdropper. A simple scheduling scheme developed improve secrecy rate. Analytical results in terms a lower bound on average rate and its scaling laws are derived evaluate performance obtain valuable design insights. Simulation provided confirm accuracy theoretical analysis validate improvement proposed over baseline schemes.
منابع مشابه
Secure Communications for Two-Way Relay Networks Via Relay Chatting
In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is proposed. Specifically, the proposed scheme selects a best relay that maximize the sum mutual information among the sources to forward the sources’ signals using an amplify-and-for...
متن کاملSecure Wireless Communications via Cooperative Transmitting
Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secret key with a new receiver at a random location, in the presence of passive eavesdroppers at unknown locations. Two spatial point processes, ...
متن کاملTruth-Telling Mechanism for Secure Two-Way Relay Communications with Energy-Harvesting Revenue
This paper brings the novel idea of paying the utility to the winning agents in terms of some physical entity in cooperative communications. Our setting is a secret twoway communication channel where two transmitters exchange information in the presence of an eavesdropper. The relays are selected from a set of interested parties such that the secrecy sum rate is maximized. In return, the select...
متن کاملPassword Authentication System using New Intense Secure Algorithm in Mobile and Server in Two way Communications
Roberto Di Pietro, Gianluigi Me, Maurizio A. Strangio . A Two –Factor Mobile Authentication Scheme for Secure Financial Transactions. International Conference on Mobile Business 2005. Harris, J. A. A One Time Password Scheme . International conference on Parallel Processing Workshops, 2002 . Proceedings. Clickatell SMS Gateway developers API available at http://www. clickatell. com/developers/a...
متن کاملSecure Two-Party Computation: A Visual Way
In this paper we propose a novel method for performing secure two-party computation. By merging together in a suitable way two beautiful ideas of the 80’s and the 90’s, Yao’s garbled circuit construction and Naor and Shamir’s visual cryptography, respectively, we enable Alice and Bob to securely evaluate a function f(·, ·) of their inputs, x and y, through a pure physical process. Indeed, once ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Communications Letters
سال: 2021
ISSN: ['1558-2558', '1089-7798', '2373-7891']
DOI: https://doi.org/10.1109/lcomm.2020.3035773