Security and Reliability Trade-off in Device to Device Communications with Untrusted Relays
In this paper, we investigate the trade-off between reliability and security in a device to device (D2D) network including a pair of D2D, an untrusted relay, and a jammer. The untrusted relay is used as aiding to D2D communications but due to untrusting the relay, data protection from eavesdropping...
| Published in: | AUT Journal of Modeling and Simulation |
|---|---|
| Main Authors: | Marzieh Izanlou, Abbas Mohammadi, Mohammad moghadam |
| Format: | Article |
| Language: | English |
| Published: |
Amirkabir University of Technology
2020-12-01
|
| Subjects: | |
| Online Access: | https://miscj.aut.ac.ir/article_3817_2eeff0b2240037404cbfa162cbfb17d6.pdf |
Similar Items
Secrecy Performance of Overlay Cognitive Radio Inspired NOMA With Untrusted Secondary User
by: Swathi Priya Indraganti, et al.
Published: (2024-01-01)
by: Swathi Priya Indraganti, et al.
Published: (2024-01-01)
Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay
by: Mei-ling LI, et al.
Published: (2017-10-01)
by: Mei-ling LI, et al.
Published: (2017-10-01)
Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay
by: Mei-ling LI, et al.
Published: (2017-10-01)
by: Mei-ling LI, et al.
Published: (2017-10-01)
On Security Performance of SWIPT Multi-User Jamming Based on Mixed RF/FSO Systems with Untrusted Relay
by: Xingyue Guo, et al.
Published: (2024-12-01)
by: Xingyue Guo, et al.
Published: (2024-12-01)
Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination
by: Rui ZHAO, et al.
Published: (2018-09-01)
by: Rui ZHAO, et al.
Published: (2018-09-01)
Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination
by: Rui ZHAO, et al.
Published: (2018-09-01)
by: Rui ZHAO, et al.
Published: (2018-09-01)
Artificial noise-assisted physical layer security in D2D-enabled cellular networks
by: Yajun Chen, et al.
Published: (2017-11-01)
by: Yajun Chen, et al.
Published: (2017-11-01)
On the Security and Reliability Trade-off of the Satellite Terrestrial Networks with Fountain Codes and Friendly Jamming
by: Quang Sang Nguyen, et al.
Published: (2023-12-01)
by: Quang Sang Nguyen, et al.
Published: (2023-12-01)
Physical layer security of modify-and-forward cooperative D2D networks based on transmit antenna selection
by: LIU Huizhi, et al.
Published: (2024-04-01)
by: LIU Huizhi, et al.
Published: (2024-04-01)
Physical layer security of modify-and-forward cooperative D2D networks based on transmit antenna selection
by: LIU Huizhi, et al.
Published: (2024-04-01)
by: LIU Huizhi, et al.
Published: (2024-04-01)
Deep Q-Learning-Based Buffer-Aided Relay Selection for Reliable and Secure Communications in Two-Hop Wireless Relay Networks
by: Cheng Zhang, et al.
Published: (2023-05-01)
by: Cheng Zhang, et al.
Published: (2023-05-01)
Reliability-Security in Wireless-Powered Cooperative Network with Friendly Jammer
by: Van Duc Phan, et al.
Published: (2022-01-01)
by: Van Duc Phan, et al.
Published: (2022-01-01)
A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning
by: Ping Xie, et al.
Published: (2022-07-01)
by: Ping Xie, et al.
Published: (2022-07-01)
A Study of Physical Layer Security in SWIPT-Based Decode-and-Forward Relay Networks with Dynamic Power Splitting
by: Van-Duc Phan, et al.
Published: (2021-08-01)
by: Van-Duc Phan, et al.
Published: (2021-08-01)
Relay Selection for Improved Physical Layer Security in Cognitive Relay Networks Using Artificial Noise
by: Shaobo Jia, et al.
Published: (2018-01-01)
by: Shaobo Jia, et al.
Published: (2018-01-01)
Security- and Reliability-Guaranteed Transmission Control of Time-Sensitive Physical Layer Security Systems
by: Jianye Li, et al.
Published: (2023-07-01)
by: Jianye Li, et al.
Published: (2023-07-01)
Reliable and Secure Short-Packet Communications in Untrusted Diamond Relay Networks
by: Shen Qian
Published: (2023-01-01)
by: Shen Qian
Published: (2023-01-01)
Security and Reliability Analysis of the Power Splitting-Based Relaying in Wireless Sensors Network
by: Minh Tran, et al.
Published: (2024-02-01)
by: Minh Tran, et al.
Published: (2024-02-01)
Secure Transmission for Simultaneous Wireless Information and Power Transfer in AF Untrusted Relay Networks
by: Hui Shi, et al.
Published: (2018-12-01)
by: Hui Shi, et al.
Published: (2018-12-01)
Reputation-Aware Relay Selection With Opportunistic Spectrum Access: A Blockchain Approach
by: Esraa M. Ghourab, et al.
Published: (2023-01-01)
by: Esraa M. Ghourab, et al.
Published: (2023-01-01)
Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks
by: Ya-jun CHEN, et al.
Published: (2016-08-01)
by: Ya-jun CHEN, et al.
Published: (2016-08-01)
Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks
by: Ya-jun CHEN, et al.
Published: (2016-08-01)
by: Ya-jun CHEN, et al.
Published: (2016-08-01)
On the security and reliability performance of SWIPT-enabled full-duplex relaying in the non-orthogonal multiple access networks
by: Quang-Sang Nguyen, et al.
Published: (2023-10-01)
by: Quang-Sang Nguyen, et al.
Published: (2023-10-01)
Physical layer security of NOMA-D2D cooperative wireless system
by: Yifan DING, et al.
Published: (2022-09-01)
by: Yifan DING, et al.
Published: (2022-09-01)
Physical layer security of NOMA-D2D cooperative wireless system
by: Yifan DING, et al.
Published: (2022-09-01)
by: Yifan DING, et al.
Published: (2022-09-01)
Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors
by: Jia You, et al.
Published: (2014-01-01)
by: Jia You, et al.
Published: (2014-01-01)
Q-Learning-Based Power Allocation for Secure Wireless Communication in UAV-Aided Relay Network
by: Sidqy I. Alnagar, et al.
Published: (2021-01-01)
by: Sidqy I. Alnagar, et al.
Published: (2021-01-01)
Physical Layer Security Analysis of Multi-Hop Hybrid RF/FSO System in Presence of Multiple Eavesdroppers
by: Dipti R. Pattanayak, et al.
Published: (2022-01-01)
by: Dipti R. Pattanayak, et al.
Published: (2022-01-01)
Security-Reliability Analysis of Noma-Based Multi-Hop Relay Networks in Presence of an Active Eavesdropper with Imperfect Eavesdropping CSI
by: Tran Tin Phu, et al.
Published: (2017-01-01)
by: Tran Tin Phu, et al.
Published: (2017-01-01)
Physical layer security performance analysis of multi-antenna full-duplex relay aided heterogeneous cellular network
by: Zhou ZHONG, et al.
Published: (2019-05-01)
by: Zhou ZHONG, et al.
Published: (2019-05-01)
Physical layer security performance analysis of multi-antenna full-duplex relay aided heterogeneous cellular network
by: Zhou ZHONG, et al.
Published: (2019-05-01)
by: Zhou ZHONG, et al.
Published: (2019-05-01)
A secure transmission method based on cooperative jamming for correlated main and wiretap channels
by: Sai XU, et al.
Published: (2021-06-01)
by: Sai XU, et al.
Published: (2021-06-01)
A secure transmission method based on cooperative jamming for correlated main and wiretap channels
by: Sai XU, et al.
Published: (2021-06-01)
by: Sai XU, et al.
Published: (2021-06-01)
A hybrid cooperative jamming protocol for full-duplex relay wiretap system
by: Wei ZHOU, et al.
Published: (2017-01-01)
by: Wei ZHOU, et al.
Published: (2017-01-01)
A hybrid cooperative jamming protocol for full-duplex relay wiretap system
by: Wei ZHOU, et al.
Published: (2017-01-01)
by: Wei ZHOU, et al.
Published: (2017-01-01)
Physical layer security performance of MF relay selection systems
by: Ying CHENG, et al.
Published: (2021-09-01)
by: Ying CHENG, et al.
Published: (2021-09-01)
Physical layer security performance of MF relay selection systems
by: Ying CHENG, et al.
Published: (2021-09-01)
by: Ying CHENG, et al.
Published: (2021-09-01)
Security-reliability tradeoff of MIMO TAS/SC networks using harvest-to-jam cooperative jamming methods with random jammer location
by: Pham Minh Nam, et al.
Published: (2023-02-01)
by: Pham Minh Nam, et al.
Published: (2023-02-01)
On the Performance of Underlay Device-to-Device Communications
by: Tan Nhat Nguyen, et al.
Published: (2022-02-01)
by: Tan Nhat Nguyen, et al.
Published: (2022-02-01)
Cascaded <i>κ</i>-<i>μ</i> Fading Channels with Colluding and Non-Colluding Eavesdroppers: Physical-Layer Security Analysis
by: Deemah Tashman, et al.
Published: (2021-08-01)
by: Deemah Tashman, et al.
Published: (2021-08-01)
Similar Items
-
Secrecy Performance of Overlay Cognitive Radio Inspired NOMA With Untrusted Secondary User
by: Swathi Priya Indraganti, et al.
Published: (2024-01-01) -
Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay
by: Mei-ling LI, et al.
Published: (2017-10-01) -
Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay
by: Mei-ling LI, et al.
Published: (2017-10-01) -
On Security Performance of SWIPT Multi-User Jamming Based on Mixed RF/FSO Systems with Untrusted Relay
by: Xingyue Guo, et al.
Published: (2024-12-01) -
Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination
by: Rui ZHAO, et al.
Published: (2018-09-01)
