Download now Free registration required
In this paper, the authors investigate joint relay and jammer selection in two-way cooperative networks, consisting of two sources, one eavesdropper, and a number of intermediate nodes, with secrecy constraints. Specifically, the proposed schemes select two or three intermediate nodes to enhance security against the malicious eavesdropper. The first selected node operates in the conventional relay mode and assists the two sources to exchange data with each other in the amplify-and-forward protocol. The second and third selected nodes are used in different communication phases as jammers in order to create intentional interference upon the eavesdropper.
- Format: PDF
- Size: 687.1 KB