Results 21 to 30 of about 7,230 (237)
Enhancing Physical Layer Security of DF Buffer-Aided Relay Networks With Small Buffer Sizes
In this paper, we propose a novel max-weight secure link selection (MWSLS) scheme to enhance physical layer security of decode-and-forward (DF) buffer-aided relay networks. The MWSLS scheme can select the link with the largest weight among all secure and
Chen Wei +3 more
doaj +1 more source
Security–reliability tradeoff analysis of untrusted energy harvesting relay networks
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen +4 more
doaj +1 more source
Secure Transmission for Differential Quadrature Spatial Modulation With Artificial Noise
In this paper, we investigate the secure transmission for differential quadrature spatial modulation (DQSM) with artificial noise (AN) in multiple-input single-output wiretap networks, where a cooperative jammer helps the secure transmission between ...
Yong Wang +5 more
doaj +1 more source
This paper investigates physical layer security analysis of cooperative non-orthogonal multiple access (NOMA) communication system. A virtual full-duplex (VFD) relaying scheme with an untrusted amplify-and-forward (AF) half-duplex (HD) relay and a ...
Weidong Guo, Yuxi Liu
doaj +1 more source
We investigate individual secrecy performance in a K-user quasi-static Rayleigh fading homogeneous multiple access wiretap channel (MAC-WT), where a legitimate receiver employs successive interference cancellation (SIC) decoding.
Kaiwei Jiang +4 more
doaj +1 more source
Physical layer security in cognitive NOMA sensor networks with full-duplex technique
This article studies the physical layer security in a downlink full-duplex cognitive non-orthogonal multiple access sensor networks (FD-C-NOMA). Compared with the existing works, this article proposes a FD-C-NOMA transmission scheme with a primary user ...
Zhihui Shang +4 more
doaj +1 more source
Tree Parity Machine Rekeying Architectures [PDF]
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core +5 more sources
Cooperative Secure Transmission in the Presence of Untrusted Relay
Considering a nonregenerative untrusted relay network, we investigate three different secure transmission strategies, for example, noncooperative strategy, conventional amplify-and-forward (AF) strategy, and cooperative jamming (CJ) strategy.
Dechuan Chen +4 more
doaj +1 more source
ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel
In this paper, a decoding method of joint zero-forcing and successive interference cancellation (ZF-SIC) is put forward to assist the study of the individual secrecy in the quasi-static Rayleigh fading single-input multiple-output multiple access wiretap
Kaiwei Jiang +4 more
doaj +1 more source
In this article, we investigate physical layer security (PLS) in non-orthogonal multiple access-enabled (NOMA-enabled) underlay cognitive radio networks (CRNs) with outdated channel state information (CSI).
Yong Chen +3 more
doaj +1 more source

