Results 31 to 40 of about 54,785 (276)

Enhancing wireless security via optimal cooperative jamming [PDF]

open access: yes, 2012
In this work, we analyze the secrecy rate in a cooperative network, where a source node is assisted by relay nodes via cooperative jamming for delivering a secret message to the destination in the presence of an eavesdropper node.
Gurbuz, Ozgur   +3 more
core   +1 more source

A New Look at Physical Layer Security, Caching, and Wireless Energy Harvesting for Heterogeneous Ultra-dense Networks [PDF]

open access: yes, 2017
Heterogeneous ultra-dense networks enable ultra-high data rates and ultra-low latency through the use of dense sub-6 GHz and millimeter wave (mmWave) small cells with different antenna configurations.
Heath Jr, Robert W.   +4 more
core   +3 more sources

On the performance of physical layer security in virtual full-duplex non-orthogonal multiple access system

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
This paper investigates physical layer security analysis of cooperative non-orthogonal multiple access (NOMA) communication system. A virtual full-duplex (VFD) relaying scheme with an untrusted amplify-and-forward (AF) half-duplex (HD) relay and a ...
Weidong Guo, Yuxi Liu
doaj   +1 more source

Secure Transmission for Differential Quadrature Spatial Modulation With Artificial Noise

open access: yesIEEE Access, 2019
In this paper, we investigate the secure transmission for differential quadrature spatial modulation (DQSM) with artificial noise (AN) in multiple-input single-output wiretap networks, where a cooperative jammer helps the secure transmission between ...
Yong Wang   +5 more
doaj   +1 more source

Physical layer security in cognitive NOMA sensor networks with full-duplex technique

open access: yesInternational Journal of Distributed Sensor Networks, 2021
This article studies the physical layer security in a downlink full-duplex cognitive non-orthogonal multiple access sensor networks (FD-C-NOMA). Compared with the existing works, this article proposes a FD-C-NOMA transmission scheme with a primary user ...
Zhihui Shang   +4 more
doaj   +1 more source

Secure Communications in Millimeter Wave Ad Hoc Networks [PDF]

open access: yes, 2017
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential ...
Heath Jr, Robert W.   +3 more
core   +2 more sources

Cooperative Secure Transmission in the Presence of Untrusted Relay

open access: yesInternational Journal of Distributed Sensor Networks, 2016
Considering a nonregenerative untrusted relay network, we investigate three different secure transmission strategies, for example, noncooperative strategy, conventional amplify-and-forward (AF) strategy, and cooperative jamming (CJ) strategy.
Dechuan Chen   +4 more
doaj   +1 more source

Tree Parity Machine Rekeying Architectures [PDF]

open access: yes, 2005
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core   +5 more sources

Physical Layer Security in NOMA-Enabled Cognitive Radio Networks With Outdated Channel State Information

open access: yesIEEE Access, 2020
In this article, we investigate physical layer security (PLS) in non-orthogonal multiple access-enabled (NOMA-enabled) underlay cognitive radio networks (CRNs) with outdated channel state information (CSI).
Yong Chen   +3 more
doaj   +1 more source

Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding [PDF]

open access: yes, 2012
In this paper, we propose a linear precoder for the downlink of a multi-user MIMO system with multiple users that potentially act as eavesdroppers. The proposed precoder is based on regularized channel inversion (RCI) with a regularization parameter ...
Collings, Iain B.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy