Results 31 to 40 of about 7,230 (237)

SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels

open access: yesIEEE Access, 2018
A new paradigm of uplink non-orthogonal multiple access along with multiple eavesdroppers to achieve secrecy transmission is studied in this paper.
Kaiwei Jiang   +4 more
doaj   +1 more source

Security-Reliability Analysis in CR-NOMA IoT Network Under I/Q Imbalance

open access: yesIEEE Access, 2023
This paper presents a controllable analysis framework for evaluating the reliability and security of underlay cognitive radio networks (CRs) relying on non-orthogonal multiple access (NOMA).
Hung Nguyen   +5 more
doaj   +1 more source

Secure Communication with a Wireless-Powered Friendly Jammer [PDF]

open access: yes, 2014
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission.
Durrani, Salman   +3 more
core   +2 more sources

Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays

open access: yes, 2015
We enhance the physical-layer security (PLS) of amplify-and-forward relaying networks with the aid of joint relay and jammer selection (JRJS), despite the deliterious effect of channel state information (CSI) feedback delays.
Cai, Yueming   +4 more
core   +1 more source

Half-duplex energy harvesting relay network over different fading environment: System performance with effect of hardware impairment [PDF]

open access: yes, 2019
In this paper, we introduce a half-duplex (HD) energy harvesting (EH) relay network over the different fading environment with the effect of hardware impairment (HI).
Dong, Si Thien Chau   +4 more
core   +1 more source

Security in Cognitive Radio Networks

open access: yes, 2014
In this paper, we investigate the information-theoretic security by modeling a cognitive radio wiretap channel under quality-of-service (QoS) constraints and interference power limitations inflicted on primary users (PUs).
Akin, Sami
core   +1 more source

Enhancing wireless security via optimal cooperative jamming [PDF]

open access: yes, 2012
In this work, we analyze the secrecy rate in a cooperative network, where a source node is assisted by relay nodes via cooperative jamming for delivering a secret message to the destination in the presence of an eavesdropper node.
Gurbuz, Ozgur   +3 more
core   +1 more source

Security Improvement With QoS Provisioning Using Service Priority and Power Allocation for NOMA-IoT Networks

open access: yesIEEE Access, 2021
Non-orthogonal multiple access (NOMA) has gained attention as a promising multiple access scheme for the Internet of Things (IoT). A typical setting of user ordering in NOMA networks with user priority difference allows a service priority for solely low ...
Waqas Khalid, Heejung Yu
doaj   +1 more source

HORNET: High-speed Onion Routing at the Network Layer [PDF]

open access: yes, 2015
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range ...
Asoni, Daniele Enrico   +4 more
core   +2 more sources

A New Look at Physical Layer Security, Caching, and Wireless Energy Harvesting for Heterogeneous Ultra-dense Networks [PDF]

open access: yes, 2017
Heterogeneous ultra-dense networks enable ultra-high data rates and ultra-low latency through the use of dense sub-6 GHz and millimeter wave (mmWave) small cells with different antenna configurations.
Heath Jr, Robert W.   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy