Results 11 to 20 of about 54,785 (276)

Effective secrecy throughput optimization for GTLS-based UWOC systems with eavesdropper outage constraint

open access: yesOptics Express
In this work, the effective secrecy throughput (EST) which explicitly captures both the reliability and secrecy features of wiretap channels for an underwater wireless optical communication (UWOC) system has been optimized by considering the generalized transmit laser selection (GTLS) scheme.
Binna, Zhou   +4 more
openaire   +3 more sources

SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels

open access: yesIEEE Access, 2018
A new paradigm of uplink non-orthogonal multiple access along with multiple eavesdroppers to achieve secrecy transmission is studied in this paper.
Kaiwei Jiang   +4 more
doaj   +2 more sources

ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel

open access: yesIEEE Access, 2017
In this paper, a decoding method of joint zero-forcing and successive interference cancellation (ZF-SIC) is put forward to assist the study of the individual secrecy in the quasi-static Rayleigh fading single-input multiple-output multiple access wiretap
Kaiwei Jiang   +4 more
doaj   +2 more sources

Individual secrecy of fading homogeneous multiple access wiretap channel with successive interference cancellation

open access: yesEURASIP Journal on Wireless Communications and Networking, 2017
We investigate individual secrecy performance in a K-user quasi-static Rayleigh fading homogeneous multiple access wiretap channel (MAC-WT), where a legitimate receiver employs successive interference cancellation (SIC) decoding.
Kaiwei Jiang   +4 more
doaj   +2 more sources

Secrecy Performance of Overlay Cognitive Radio Inspired NOMA With Untrusted Secondary User

open access: yesIEEE Access
In this paper, we investigate the integration of physical layer security (PLS) and cognitive radio (CR) technologies with non-orthogonal multiple access (NOMA) to enhance spectral efficiency (SE) and security in fifth generation (5G) and beyond wireless ...
Swathi Priya Indraganti   +1 more
doaj   +2 more sources

Secrecy Performance Analysis of Hybrid RF/FSO System under Different Eavesdropping Strategies

open access: yesPhotonics
In this paper, we analyze the confidentiality of a hybrid radio frequency (RF)/free-space optical (FSO) system with regard to physical layer security (PLS). In this system, signals are transmitted between the source and destination using RF and FSO links,
Xinkang Song   +4 more
doaj   +2 more sources

Secrecy Performance Analysis of Energy Harvesting Untrusted Relay Networks with Hardware Impairments

open access: yesInternational Journal of Distributed Sensor Networks
In this work, we focus on the issue of secure communication in energy harvesting untrusted relay networks taking into account the impact of hardware impairments, where an energy-constrained relay, powered by received radio frequency signals, attempts to ...
Dechuan Chen   +5 more
doaj   +2 more sources

Secrecy Rate Maximizing Beamforming Schemes for the DF Relay Wiretap Channels

open access: yesIEEE Access, 2018
We consider beamforming schemes for the multi-antenna decode-and-forward (DF) relays that maximize the secrecy rate (SR) in the relay wiretap channel. Both full-duplex (FD) and half-duplex (HD) relays are considered, where the FD relay fights the loop ...
Duckdong Hwang   +4 more
doaj   +2 more sources

Secrecy Outage Analysis of Energy Harvesting Relay-based Mixed UOWC-RF Network with Multiple Eavesdroppers [PDF]

open access: yesarXiv.org, 2023
This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay
Moloy Kumar Ghosh   +7 more
semanticscholar   +1 more source

Physical Layer Security Analysis of Multi-Hop Hybrid RF/FSO System in Presence of Multiple Eavesdroppers

open access: yesIEEE Photonics Journal, 2022
In this paper, the physical layer security (PLS) analysis for a decode-and-forward (DF) protocol based multi-hop hybrid radio frequency (RF)/ free space optics (FSO) is presented.
Dipti R. Pattanayak   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy