Research Article

Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming

Figure 2

The SWIPT scheme for untrusted relay flow diagram.