Results 21 to 30 of about 54,785 (276)

Security enhancement for NOMA-UAV networks [PDF]

open access: yes, 2020
Owing to its distinctive merits, non-orthogonal multiple access (NOMA) techniques have been utilized in unmanned aerial vehicle (UAV) enabled wireless base stations to provide effective coverage for terrestrial users.
Chen, Yunfei   +6 more
core   +1 more source

Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2017
In this paper, we consider a scenario where two multiple-aperture legitimate nodes (Alice and Bob) communicate by means of free-space optical communication in the presence of a multiple-aperture eavesdropper (Eve), which is subject to pointing errors ...
Marcos Eduardo Pivaro Monteiro   +3 more
semanticscholar   +1 more source

Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks

open access: yesSensors, 2018
In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed.
Xuanxuan Tang   +5 more
doaj   +1 more source

Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers

open access: yesEntropy, 2020
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency.
Yue Wu   +4 more
doaj   +1 more source

Secure Communication with a Wireless-Powered Friendly Jammer [PDF]

open access: yes, 2014
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission.
Durrani, Salman   +3 more
core   +2 more sources

Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

open access: yesSensors, 2016
In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative ...
Maoqiang Yang   +5 more
doaj   +1 more source

Secure Transmission for Energy Efficient Parallel Mixed FSO/RF System in Presence of Independent Eavesdroppers

open access: yesIEEE Photonics Journal, 2022
In this paper, the physical layer security (PLS) challenges for a decode and forward (DF) based dual hop mixed free space optical (FSO) / radio frequency (RF) communication system in the presence of multiple eavesdroppers has been investigated.
Dipti R. Pattanayak   +5 more
doaj   +1 more source

Optimal Beamforming for Physical Layer Security in MISO Wireless Networks [PDF]

open access: yes, 2018
A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas while the users and eavesdropper are equipped with a single antenna, is considered.
Duong, Trung Q.   +3 more
core   +2 more sources

Enhancing Physical Layer Security of DF Buffer-Aided Relay Networks With Small Buffer Sizes

open access: yesIEEE Access, 2019
In this paper, we propose a novel max-weight secure link selection (MWSLS) scheme to enhance physical layer security of decode-and-forward (DF) buffer-aided relay networks. The MWSLS scheme can select the link with the largest weight among all secure and
Chen Wei   +3 more
doaj   +1 more source

Security–reliability tradeoff analysis of untrusted energy harvesting relay networks

open access: yesInternational Journal of Distributed Sensor Networks, 2018
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy