Results 231 to 240 of about 54,785 (276)

Effective Secrecy Throughput in PLC Systems Threatened by a Wireless Eavesdropper: A Practical Perspective

open access: yesAnais do XL Simpósio Brasileiro de Telecomunicações e Processamento de Sinais, 2022
Álvaro G. S. Correia   +2 more
openaire   +2 more sources

Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay

2022 International Conference on Networking and Network Applications (NaNA), 2022
In this paper, we investigate a fundamental issue of power control to provide secrecy transmission for a dual-hop satellite communication system consisting of a terrestrial station as the source, a terrestrial station as the destination, a satellite ...
Yeqiu Xiao   +4 more
openaire   +2 more sources

Effective Secrecy Throughput Maximization for WPT Enabled IoT in the FBL Regime

2024 10th International Conference on Computer and Communications (ICCC)
The inherent broadcast nature of wireless communication makes data transmissions vulnerable to eavesdropping, creating a critical need to balance communication reliability with security.
Ning Guo   +5 more
openaire   +2 more sources

Secrecy Throughput Optimization and Precoding Design in Adaptive Transmit Antenna Selection Systems With Limited Feedback

IEEE Transactions on Vehicular Technology, 2022
We analyze the secrecy performance of a wireless system with limited feedback, where the channel state information (CSI) is imperfectly known at a multi-antenna source.
Tong Wu, Yulong Zou, Yuhan Jiang
semanticscholar   +1 more source

On Effective Secrecy Throughput of Underlay Spectrum Sharing $��$-$��$/ M��laga Hybrid Model under Interference-and-Transmit Power Constraints

2021
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes
Ibrahim, Md.   +4 more
openaire   +1 more source

Secrecy Analysis of Control Information for UAV

IEEE Transactions on Vehicular Technology, 2023
In this correspondence, we investigate the average achievable secrecy rate (AASR) and average effective secrecy throughput (AEST) of the control link from the ground control station to the unmanned aerial vehicle (UAV), which requires ultra-reliable and ...
Huabing Lu   +4 more
semanticscholar   +1 more source

Secrecy Outage Performance of FD-NOMA Relay System With Multiple Non-Colluding Eavesdroppers

IEEE Transactions on Vehicular Technology, 2021
In this paper, we investigate the secrecy performance of a full-duplex (FD) non-orthogonal multiple access (NOMA) relay system under the presence of multiple non-colluding eavesdroppers over Rayleigh fading channels.
T. Hoang   +4 more
semanticscholar   +1 more source

Secrecy Performance Analysis of UAV-Based Relay Communications with SWIPT

International Conference on Speech Technology and Human-Computer Dialogue, 2022
In this paper, we study the secure transmission of unmanned aerial vehicle (UAV) simultaneous wireless information and power transfer (SWIPT) wireless communication.
Danyu Diao   +4 more
semanticscholar   +1 more source

Secrecy Performance for Full-Duplex Jamming-Aided Uplink NOMA System

IEEE Transactions on Vehicular Technology, 2021
Full duplex (FD) is one of the most attractive technologies in enhancing spectral efficiency for potentially doubling the system throughput. In this work, we employ FD jamming to improve the secrecy performance of an uplink non-orthogonal multiple access
Kaiwei Jiang, Haiping Wang
semanticscholar   +1 more source

Secrecy Analysis for NOMA networks With a Full-Duplex Jamming Relay

IEEE Wireless Communications and Networking Conference, 2021
Non-orthogonal multiple access (NOMA) is an important technology for the forthcoming 5G and beyond. However, its privacy often suffers from adversarial eavesdropping, especially for the users with higher transmit power.
Dongdong Li   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy