Results 21 to 30 of about 54,785 (276)
Security enhancement for NOMA-UAV networks [PDF]
Owing to its distinctive merits, non-orthogonal multiple access (NOMA) techniques have been utilized in unmanned aerial vehicle (UAV) enabled wireless base stations to provide effective coverage for terrestrial users.
Chen, Yunfei +6 more
core +1 more source
Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints [PDF]
In this paper, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of free-space optical communication in the presence of a multiple-aperture eavesdropper (Eve), which is subject to pointing errors ...
Marcos Eduardo Pivaro Monteiro +3 more
semanticscholar +1 more source
Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks
In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed.
Xuanxuan Tang +5 more
doaj +1 more source
Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency.
Yue Wu +4 more
doaj +1 more source
Secure Communication with a Wireless-Powered Friendly Jammer [PDF]
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission.
Durrani, Salman +3 more
core +2 more sources
Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative ...
Maoqiang Yang +5 more
doaj +1 more source
In this paper, the physical layer security (PLS) challenges for a decode and forward (DF) based dual hop mixed free space optical (FSO) / radio frequency (RF) communication system in the presence of multiple eavesdroppers has been investigated.
Dipti R. Pattanayak +5 more
doaj +1 more source
Optimal Beamforming for Physical Layer Security in MISO Wireless Networks [PDF]
A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas while the users and eavesdropper are equipped with a single antenna, is considered.
Duong, Trung Q. +3 more
core +2 more sources
Enhancing Physical Layer Security of DF Buffer-Aided Relay Networks With Small Buffer Sizes
In this paper, we propose a novel max-weight secure link selection (MWSLS) scheme to enhance physical layer security of decode-and-forward (DF) buffer-aided relay networks. The MWSLS scheme can select the link with the largest weight among all secure and
Chen Wei +3 more
doaj +1 more source
Security–reliability tradeoff analysis of untrusted energy harvesting relay networks
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen +4 more
doaj +1 more source

