On Cooperative Relaying Schemes for Wireless Physical Layer Security
@article{Li2011OnCR, title={On Cooperative Relaying Schemes for Wireless Physical Layer Security}, author={J. Li and A. Petropulu and S. Weber}, journal={IEEE Transactions on Signal Processing}, year={2011}, volume={59}, pages={4985-4997} }
We consider a cooperative wireless network in the presence of one or more eavesdroppers, and exploit node cooperation for achieving physical (PHY) layer based security. Two different cooperation schemes are considered. In the first scheme, cooperating nodes retransmit a weighted version of the source signal in a decode-and-forward (DF) fashion. In the second scheme, referred to as cooperative jamming (CJ), while the source is transmitting, cooperating nodes transmit weighted noise to confound… Expand
375 Citations
Cooperation Based on Decode-and-Forward Plus Cooperative Jamming for Wireless Physical Layer Security
- Computer Science
- 2015
- 2
- Highly Influenced
- PDF
Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers
- Engineering, Computer Science
- Trans. Emerg. Telecommun. Technol.
- 2014
- 19
Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks
- Computer Science
- IEEE Transactions on Information Forensics and Security
- 2013
- 179
Improving physical layer security in DF relay networks via two-stage cooperative jamming
- Computer Science
- 2016 24th European Signal Processing Conference (EUSIPCO)
- 2016
- 6
- Highly Influenced
- PDF
Joint Cooperative Beamforming and Jamming for Physical-Layer Security of Decode-and-Forward Relay Networks
- Computer Science
- IEEE Access
- 2017
- 25
- Highly Influenced
Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks
- Computer Science
- IEEE Transactions on Wireless Communications
- 2015
- 126
Optimal Power Allocation for Physical Layer Security in Multi-Hop DF Relay Networks
- Computer Science
- IEEE Transactions on Wireless Communications
- 2016
- 36
On Maximizing the Secrecy Rate in a Cooperative Wireless Network using Friendly Jammers
- Computer Science
- 2016
- PDF
Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks
- Computer Science, Mathematics
- IEEE Transactions on Wireless Communications
- 2016
- 60
- PDF
References
SHOWING 1-10 OF 52 REFERENCES
Transmit power minimization under secrecy capacity constraint in cooperative wireless communications
- Engineering
- 2009 IEEE/SP 15th Workshop on Statistical Signal Processing
- 2009
- 5
Secure wireless communications via cooperation
- Computer Science, Mathematics
- 2008 46th Annual Allerton Conference on Communication, Control, and Computing
- 2008
- 159
- PDF
Secrecy rate optimization under cooperation with perfect channel state information
- Engineering
- 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers
- 2009
- 17
Improving Wireless Physical Layer Security via Cooperating Relays
- Computer Science
- IEEE Transactions on Signal Processing
- 2010
- 1,184
- PDF
Amplify-and-forward based cooperation for secure wireless communications
- Computer Science
- 2009 IEEE International Conference on Acoustics, Speech and Signal Processing
- 2009
- 94
- PDF
The Relay–Eavesdropper Channel: Cooperation for Secrecy
- Computer Science, Mathematics
- IEEE Transactions on Information Theory
- 2008
- 777
- PDF
The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming
- Computer Science, Mathematics
- IEEE Transactions on Information Theory
- 2008
- 708
- PDF
On the Secrecy Capacity of Fading Channels
- Computer Science, Mathematics
- 2007 IEEE International Symposium on Information Theory
- 2007
- 738
- PDF
Distributed Beamforming for Relay Networks Based on Second-Order Statistics of the Channel State Information
- Computer Science, Mathematics
- IEEE Transactions on Signal Processing
- 2008
- 421
- PDF
The Gaussian wiretap channel with a helping interferer
- Computer Science, Mathematics
- 2008 IEEE International Symposium on Information Theory
- 2008
- 173
- PDF