Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach.
Lu LvFuhui ZhouJian ChenNaofal Al-DhahirPublished in: IEEE Trans. Inf. Forensics Secur. (2019)
Keyphrases
- cooperative
- sensitive data
- mobile peer to peer
- group communication
- base station
- relay selection
- third party
- communication networks
- multi agent systems
- security requirements
- security policies
- communication systems
- privacy preserving
- covert channel
- relay nodes
- data storage
- multi agent
- cooperating agents
- key management
- multi party
- security issues
- game theory
- security mechanisms
- security analysis
- cognitive radio
- private information
- identity management
- data quality
- smart card
- energy consumption
- intrusion detection