Results 31 to 40 of about 54,785 (276)
Enhancing wireless security via optimal cooperative jamming [PDF]
In this work, we analyze the secrecy rate in a cooperative network, where a source node is assisted by relay nodes via cooperative jamming for delivering a secret message to the destination in the presence of an eavesdropper node.
Gurbuz, Ozgur +3 more
core +1 more source
A New Look at Physical Layer Security, Caching, and Wireless Energy Harvesting for Heterogeneous Ultra-dense Networks [PDF]
Heterogeneous ultra-dense networks enable ultra-high data rates and ultra-low latency through the use of dense sub-6 GHz and millimeter wave (mmWave) small cells with different antenna configurations.
Heath Jr, Robert W. +4 more
core +3 more sources
This paper investigates physical layer security analysis of cooperative non-orthogonal multiple access (NOMA) communication system. A virtual full-duplex (VFD) relaying scheme with an untrusted amplify-and-forward (AF) half-duplex (HD) relay and a ...
Weidong Guo, Yuxi Liu
doaj +1 more source
Secure Transmission for Differential Quadrature Spatial Modulation With Artificial Noise
In this paper, we investigate the secure transmission for differential quadrature spatial modulation (DQSM) with artificial noise (AN) in multiple-input single-output wiretap networks, where a cooperative jammer helps the secure transmission between ...
Yong Wang +5 more
doaj +1 more source
Physical layer security in cognitive NOMA sensor networks with full-duplex technique
This article studies the physical layer security in a downlink full-duplex cognitive non-orthogonal multiple access sensor networks (FD-C-NOMA). Compared with the existing works, this article proposes a FD-C-NOMA transmission scheme with a primary user ...
Zhihui Shang +4 more
doaj +1 more source
Secure Communications in Millimeter Wave Ad Hoc Networks [PDF]
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential ...
Heath Jr, Robert W. +3 more
core +2 more sources
Cooperative Secure Transmission in the Presence of Untrusted Relay
Considering a nonregenerative untrusted relay network, we investigate three different secure transmission strategies, for example, noncooperative strategy, conventional amplify-and-forward (AF) strategy, and cooperative jamming (CJ) strategy.
Dechuan Chen +4 more
doaj +1 more source
Tree Parity Machine Rekeying Architectures [PDF]
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core +5 more sources
In this article, we investigate physical layer security (PLS) in non-orthogonal multiple access-enabled (NOMA-enabled) underlay cognitive radio networks (CRNs) with outdated channel state information (CSI).
Yong Chen +3 more
doaj +1 more source
Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding [PDF]
In this paper, we propose a linear precoder for the downlink of a multi-user MIMO system with multiple users that potentially act as eavesdroppers. The proposed precoder is based on regularized channel inversion (RCI) with a regularization parameter ...
Collings, Iain B. +4 more
core +1 more source

