Results 11 to 20 of about 54,785 (276)
In this work, the effective secrecy throughput (EST) which explicitly captures both the reliability and secrecy features of wiretap channels for an underwater wireless optical communication (UWOC) system has been optimized by considering the generalized transmit laser selection (GTLS) scheme.
Binna, Zhou +4 more
openaire +3 more sources
SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels
A new paradigm of uplink non-orthogonal multiple access along with multiple eavesdroppers to achieve secrecy transmission is studied in this paper.
Kaiwei Jiang +4 more
doaj +2 more sources
ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel
In this paper, a decoding method of joint zero-forcing and successive interference cancellation (ZF-SIC) is put forward to assist the study of the individual secrecy in the quasi-static Rayleigh fading single-input multiple-output multiple access wiretap
Kaiwei Jiang +4 more
doaj +2 more sources
We investigate individual secrecy performance in a K-user quasi-static Rayleigh fading homogeneous multiple access wiretap channel (MAC-WT), where a legitimate receiver employs successive interference cancellation (SIC) decoding.
Kaiwei Jiang +4 more
doaj +2 more sources
Secrecy Performance of Overlay Cognitive Radio Inspired NOMA With Untrusted Secondary User
In this paper, we investigate the integration of physical layer security (PLS) and cognitive radio (CR) technologies with non-orthogonal multiple access (NOMA) to enhance spectral efficiency (SE) and security in fifth generation (5G) and beyond wireless ...
Swathi Priya Indraganti +1 more
doaj +2 more sources
Secrecy Performance Analysis of Hybrid RF/FSO System under Different Eavesdropping Strategies
In this paper, we analyze the confidentiality of a hybrid radio frequency (RF)/free-space optical (FSO) system with regard to physical layer security (PLS). In this system, signals are transmitted between the source and destination using RF and FSO links,
Xinkang Song +4 more
doaj +2 more sources
Secrecy Performance Analysis of Energy Harvesting Untrusted Relay Networks with Hardware Impairments
In this work, we focus on the issue of secure communication in energy harvesting untrusted relay networks taking into account the impact of hardware impairments, where an energy-constrained relay, powered by received radio frequency signals, attempts to ...
Dechuan Chen +5 more
doaj +2 more sources
Secrecy Rate Maximizing Beamforming Schemes for the DF Relay Wiretap Channels
We consider beamforming schemes for the multi-antenna decode-and-forward (DF) relays that maximize the secrecy rate (SR) in the relay wiretap channel. Both full-duplex (FD) and half-duplex (HD) relays are considered, where the FD relay fights the loop ...
Duckdong Hwang +4 more
doaj +2 more sources
Secrecy Outage Analysis of Energy Harvesting Relay-based Mixed UOWC-RF Network with Multiple Eavesdroppers [PDF]
This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay
Moloy Kumar Ghosh +7 more
semanticscholar +1 more source
In this paper, the physical layer security (PLS) analysis for a decode-and-forward (DF) protocol based multi-hop hybrid radio frequency (RF)/ free space optics (FSO) is presented.
Dipti R. Pattanayak +4 more
doaj +1 more source

