Results 21 to 30 of about 7,230 (237)

Enhancing Physical Layer Security of DF Buffer-Aided Relay Networks With Small Buffer Sizes

open access: yesIEEE Access, 2019
In this paper, we propose a novel max-weight secure link selection (MWSLS) scheme to enhance physical layer security of decode-and-forward (DF) buffer-aided relay networks. The MWSLS scheme can select the link with the largest weight among all secure and
Chen Wei   +3 more
doaj   +1 more source

Security–reliability tradeoff analysis of untrusted energy harvesting relay networks

open access: yesInternational Journal of Distributed Sensor Networks, 2018
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen   +4 more
doaj   +1 more source

Secure Transmission for Differential Quadrature Spatial Modulation With Artificial Noise

open access: yesIEEE Access, 2019
In this paper, we investigate the secure transmission for differential quadrature spatial modulation (DQSM) with artificial noise (AN) in multiple-input single-output wiretap networks, where a cooperative jammer helps the secure transmission between ...
Yong Wang   +5 more
doaj   +1 more source

On the performance of physical layer security in virtual full-duplex non-orthogonal multiple access system

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
This paper investigates physical layer security analysis of cooperative non-orthogonal multiple access (NOMA) communication system. A virtual full-duplex (VFD) relaying scheme with an untrusted amplify-and-forward (AF) half-duplex (HD) relay and a ...
Weidong Guo, Yuxi Liu
doaj   +1 more source

Individual secrecy of fading homogeneous multiple access wiretap channel with successive interference cancellation

open access: yesEURASIP Journal on Wireless Communications and Networking, 2017
We investigate individual secrecy performance in a K-user quasi-static Rayleigh fading homogeneous multiple access wiretap channel (MAC-WT), where a legitimate receiver employs successive interference cancellation (SIC) decoding.
Kaiwei Jiang   +4 more
doaj   +1 more source

Physical layer security in cognitive NOMA sensor networks with full-duplex technique

open access: yesInternational Journal of Distributed Sensor Networks, 2021
This article studies the physical layer security in a downlink full-duplex cognitive non-orthogonal multiple access sensor networks (FD-C-NOMA). Compared with the existing works, this article proposes a FD-C-NOMA transmission scheme with a primary user ...
Zhihui Shang   +4 more
doaj   +1 more source

Tree Parity Machine Rekeying Architectures [PDF]

open access: yes, 2005
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core   +5 more sources

Cooperative Secure Transmission in the Presence of Untrusted Relay

open access: yesInternational Journal of Distributed Sensor Networks, 2016
Considering a nonregenerative untrusted relay network, we investigate three different secure transmission strategies, for example, noncooperative strategy, conventional amplify-and-forward (AF) strategy, and cooperative jamming (CJ) strategy.
Dechuan Chen   +4 more
doaj   +1 more source

ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel

open access: yesIEEE Access, 2017
In this paper, a decoding method of joint zero-forcing and successive interference cancellation (ZF-SIC) is put forward to assist the study of the individual secrecy in the quasi-static Rayleigh fading single-input multiple-output multiple access wiretap
Kaiwei Jiang   +4 more
doaj   +1 more source

Physical Layer Security in NOMA-Enabled Cognitive Radio Networks With Outdated Channel State Information

open access: yesIEEE Access, 2020
In this article, we investigate physical layer security (PLS) in non-orthogonal multiple access-enabled (NOMA-enabled) underlay cognitive radio networks (CRNs) with outdated channel state information (CSI).
Yong Chen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy