This paper investigates secure communications of energy harvesting untrusted relay networks, where the destination assists jamming signal to prevent the untrusted relay from eavesdropping and to improve the forwarding ability of the energy constrained relay. Firstly, the source and the destination transmit the signals to the relay with maximal ratio transmission (MRT) technique or transmit antenna selection (TAS) technique. Then, the destination utilizes maximal ratio combining (MRC) technique or receive antenna selection (RAS) technique to receive the forwarded information. Therefore, four transmission and reception schemes are considered. For each scheme, the closed-form expressions of the secrecy outage probability (SOP) and the connection outage probability (COP) are derived. Besides, the effective secrecy throughput (EST) metric is analyzed to achieve a good tradeoff between security and reliability. In addition, the asymptotic performance of EST is also considered at the high signal-to-noise ratio (SNR). Finally, simulation results illustrate that: (1) the EST of the system with MRT and MRC scheme are superior to other schemes, however, in the high SNR regime, the EST of the system with MRT scheme is inferior to TAS; and (2) for the source node, there exists an optimal number of antennas to maximize the EST of the proposed schemes.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6338946 | PMC |
http://dx.doi.org/10.3390/s19010076 | DOI Listing |
Entropy (Basel)
September 2024
College of Computer Science, Chongqing University, Chongqing 400044, China.
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference node. The channel between the relay and Alice serves as the reference channel.
View Article and Find Full Text PDFEntropy (Basel)
July 2024
Information and Navigation College, Air Force Engineering University, Xi'an 710077, China.
The integration of terrestrial- and satellite-based quantum key distribution (QKD) experiments has markedly advanced global-scale quantum networks, showcasing the growing maturity of quantum technologies. Notably, the use of unmanned aerial vehicles (UAVs) as relay nodes has emerged as a promising method to overcome the inherent limitations of fiber-based and low-Earth orbit (LEO) satellite connections. This paper introduces a protocol for measurement-device-independent QKD (MDI-QKD) using photon orbital angular momentum (OAM) encoding, with UAVs as relay platforms.
View Article and Find Full Text PDFEntropy (Basel)
April 2023
Guangdong Provincial Key Laboratory of Nanophotonic Functional Materials and Devices, Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials, South China Normal University, Guangzhou 510006, China.
The Measurement-Device-Independent-Quantum Key Distribution (MDI-QKD) has the advantage of extending the secure transmission distances. The MDI-QKD combined with the Hybrid-Trusted and Untrusted Relay (HTUR) is used to deploy large-scale QKD networks, which effectively saves deployment cost. We propose an improved scheme for the QKD network architecture and cost analysis, which simplifies the number of QKD transmitters and incorporates the quantum key pool (QKP) in the QKD network.
View Article and Find Full Text PDFFree-space quantum key distribution (QKD) has been gaining popularity in recent years due to its advantages in creating networking options for the quantum internet. One of the main challenges to be addressed in QKD is the achievable secret key rate, which must meet current and future demand. Some of the existing solutions include the use of higher bandwidth electronics, untrusted relay architectures such as Twin-Field QKD, or high dimensional QKD.
View Article and Find Full Text PDFSci Rep
October 2022
Department of Computer Science, University of York, York, YO10 5GH, UK.
A continuous variable (CV), measurement device independent (MDI) quantum key distribution (QKD) protocol is analyzed, enabling three parties to connect for quantum conferencing. We utilise a generalised Bell detection at an untrusted relay and a postselection procedure, in which distant parties reconcile on the signs of the displacements of the quadratures of their prepared coherent states. We derive the rate of the protocol under a collective pure-loss attack, demonstrating improved rate-distance performance compared to the equivalent non-post-selected protocol.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!