On Cooperative Relaying Schemes for Wireless Physical Layer Security

@article{Li2011OnCR,
  title={On Cooperative Relaying Schemes for Wireless Physical Layer Security},
  author={J. Li and A. Petropulu and S. Weber},
  journal={IEEE Transactions on Signal Processing},
  year={2011},
  volume={59},
  pages={4985-4997}
}
  • J. Li, A. Petropulu, S. Weber
  • Published 2011
  • Computer Science, Mathematics
  • IEEE Transactions on Signal Processing
  • We consider a cooperative wireless network in the presence of one or more eavesdroppers, and exploit node cooperation for achieving physical (PHY) layer based security. Two different cooperation schemes are considered. In the first scheme, cooperating nodes retransmit a weighted version of the source signal in a decode-and-forward (DF) fashion. In the second scheme, referred to as cooperative jamming (CJ), while the source is transmitting, cooperating nodes transmit weighted noise to confound… CONTINUE READING
    Cooperation Based on Decode-and-Forward Plus Cooperative Jamming for Wireless Physical Layer Security
    • 2
    • Highly Influenced
    • Open Access
    Improving physical layer security in DF relay networks via two-stage cooperative jamming
    • 6
    • Highly Influenced
    • Open Access
    Joint Cooperative Beamforming and Jamming for Physical-Layer Security of Decode-and-Forward Relay Networks
    • 22
    • Highly Influenced
    • Open Access
    Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks
    • 121
    Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks
    • 54
    • Open Access

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 52 REFERENCES
    Secure wireless communications via cooperation
    • 158
    • Open Access
    Improving Wireless Physical Layer Security via Cooperating Relays
    • 1,153
    • Open Access
    Amplify-and-forward based cooperation for secure wireless communications
    • 93
    • Open Access
    The Relay–Eavesdropper Channel: Cooperation for Secrecy
    • 766
    • Open Access
    The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming
    • 682
    • Open Access
    On the Secrecy Capacity of Fading Channels
    • 701
    • Open Access
    The Gaussian wiretap channel with a helping interferer
    • 172
    • Open Access