The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider “harvest-then-use” based simultaneous wireless information and power transfer (SWIPT) for cooperative relay transmission, where a multiple-input multiple-output (MIMO) relay adopts decode-and-forward (DF) relaying strategy for information forwarding. By considering practical power splitting (PS) relay receiver architecture, joint optimization problem of power allocation...
In this paper, we consider the secure connection problem in multihop wireless networks with full-duplex (FD) jamming relaying, where the colluding eavesdroppers are randomly distributed following a homogeneous Poisson point process (PPP). By applying FD, each legitimate node (including relay and destination) jams the eavesdroppers when it receives the desired signal from transmitter. We adopt the...
We consider the problem of multicasting information from a source to a destination over a multihop network of intermediate relays. However, some of the relays are untrustworthy and may be subject to eavesdropping. The source wishes to enlist their help while keeping the message secret against the eavesdropper. By employing random linear network coding at the relays, the problem is modeled as a noncoherent...
In this work, we maximize the secrecy rate of the wireless-powered untrusted amplify-and-forward relay networks by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). To guarantee secure communication, the destination-based artificial noise is sent to degrade the reception of the untrusted relay, and...
In this paper, we consider a cognitive radio network (CRN) consisting of a primary transmitter-receiver pair and an untrusted secondary transmitter-receiver pair, and each pair is a multiple-input single-output (MISO) link. We consider two transmission schemes, namely underlay scheme and cooperative scheme. For the underlay scheme, the secondary user (SU) is allowed to transmit simultaneously in the...
In this paper, we study the secrecy rate maximization problem with the group-sparse penalty in the form of a mixed £f/£i regularization to design beamformers in Amplify-and-Forward (AF) relay networks. Resorting to such group-sparse penalty, we can efficiently choose a small size of relays to join in the secure transmission and reduce the cooperation overhead. In our work, the proximal gradient algorithm...
The forwarding activities of Pocket Switched Network (PSN) under social scene has attracted increasing attention, which are deeply affected by the social features of PSN nodes, especially the social network structure and characteristics of selfishness among nodes that jointly construct their behavior model under an opportunistic forwarding environment. Through both analysis and simulation, we investigate...
Most existing works about scheduling and resource allocation for orthogonal frequency division multiplexing (OFDM) based two-way relay networks have focused on immediate relay forwarding. In this paper, we consider relay buffering in delay-tolerant networks. The relay node is aided by two buffers and one for each user, so that it can adaptively decide when to buffer the received packets or to forward...
From security perspective, a friendly relay may help to keep the confidential messages from being eavesdropped, while an untrusted relay may intentionally eavesdrop the messages when relaying. This paper studies the secure beamforming for multiple-input multiple-output (MIMO) two-way communications, where two source nodes exchange information with the help of an untrusted relay node. The relay adopts...
This paper considers a relay-assisted bidirectional cellular network where the base station (BS) communicates with each mobile station (MS) using orthogonal frequency-division multiple-access (OFDMA) for both uplink and downlink. We first introduce a novel three-time-slot time-division duplexing (TDD) transmission protocol. This protocol unifies the direct transmission, one-way relaying and network-coded...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.