Results 21 to 30 of about 1,051 (211)

Secured green communication scheme for interference alignment based networks [PDF]

open access: yes, 2020
In this paper, a new security and green communication scheme is proposed to the Interference-Alignment (IA) based networks. To achieve a secured communication, full-duplex receivers are utilized to transmit artificial noise (AN). Both the signals and the
Chen, Yunfei   +8 more
core   +1 more source

Graph Theory Based Cooperative Transmission for Physical-Layer Security in 5G Large-Scale Wireless Relay Networks

open access: yesIEEE Access, 2017
In this paper, multi-hop cooperative techniques are adopted to improve the physical-layer security in 5G large-scale decode-and-forward relay networks with massive relays and eavesdroppers.
Chensi Zhang   +3 more
doaj   +1 more source

A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack

open access: yesSensors, 2018
Eavesdropping attack is one of the most serious threats in industrial crowdsensing networks. In this paper, we propose a novel anti-eavesdropping scheme by introducing friendly jammers to an industrial crowdsensing network.
Xuran Li   +3 more
doaj   +1 more source

Anti-Eavesdropping Space-Time Network Coding for Cooperative Communications [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2011
Due to the broadcast nature of wireless medium, wireless transmissions can be overheard by any undesired receivers with eavesdropping capability within source transmission range. A novel physical layer approach for secure wireless cooperative communications against eavesdropping is proposed in this paper.
Zhenzhen Gao, Yu-Han Yang, K. J. Ray Liu
openaire   +1 more source

On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks

open access: yesSensors, 2016
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a
Xuran Li   +3 more
doaj   +1 more source

Avian Alarm Calls Do Not Induce Anti-Predator Response in Three Anuran Species

open access: yesAnimals, 2022
Many species produce alarm calls in response to predators, and the anti-predator signals are often used by other species. Eavesdropping on heterospecific alarm calls has been widely found in bird and mammal species.
Longhui Zhao   +3 more
doaj   +1 more source

Artificial noise assisted secure interference networks with wireless power transfer [PDF]

open access: yes, 2017
Interference alignment (IA) is a remarkable technique to manage interference, and artificial noise (AN) can be utilized to combat one main threat of security, passive eavesdropping.
Cao, Yang   +5 more
core   +1 more source

SCIM: Incorporating secure communication and interference management in one operation

open access: yesDigital Communications and Networks, 2023
Due to the broadcast nature of wireless communications, users’ data transmitted wirelessly is susceptible to security/privacy threats. Meanwhile, as a result of the limitation of spectrum resources, massive wireless connections will incur serious ...
Zhao Li   +5 more
doaj   +1 more source

Robust Secure Transmission of Using Main-Lobe-Integration Based Leakage Beaforming in Directional Modulation MU-MIMO Systems [PDF]

open access: yes, 2017
In the paper, we make an investigation of robust beamforming for secure directional modulation in the multi-user multiple-input and multiple output (MU-MIMO) systems in the presence of direction angle measurement errors.
Li, Jun   +4 more
core   +3 more sources

Software Defined Networks based Smart Grid Communication: A Comprehensive Survey [PDF]

open access: yes, 2019
The current power grid is no longer a feasible solution due to ever-increasing user demand of electricity, old infrastructure, and reliability issues and thus require transformation to a better grid a.k.a., smart grid (SG).
Assi, Chadi   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy