Physical Layer Security in Untrusted Diamond Relay Networks With Imperfect Source-Relay Links.
Shen QianXin HeXiaobo ZhouPublished in: ISNCC (2022)
Keyphrases
- physical layer
- multi hop
- relay nodes
- wireless communication
- wireless networks
- wireless ad hoc networks
- cellular networks
- application layer
- network layer
- security policies
- resource utilization
- wireless sensor networks
- mobile ad hoc networks
- end to end
- base station
- energy efficient
- energy consumption
- data transmission
- communication systems
- ad hoc networks
- information security
- multipath
- access control
- mac protocol
- bit error rate
- smart grid
- computer networks
- network resources
- network security
- network structure
- sensor nodes
- communication protocol
- computer simulation
- social networks