Results 101 to 110 of about 1,643 (150)
Some of the next articles are maybe not open access.

Secrecy Performance Analysis of UAV-Based Relay Communications with SWIPT

International Conference on Speech Technology and Human-Computer Dialogue, 2022
In this paper, we study the secure transmission of unmanned aerial vehicle (UAV) simultaneous wireless information and power transfer (SWIPT) wireless communication.
Danyu Diao   +4 more
semanticscholar   +1 more source

Secrecy Performance for Full-Duplex Jamming-Aided Uplink NOMA System

IEEE Transactions on Vehicular Technology, 2021
Full duplex (FD) is one of the most attractive technologies in enhancing spectral efficiency for potentially doubling the system throughput. In this work, we employ FD jamming to improve the secrecy performance of an uplink non-orthogonal multiple access
Kaiwei Jiang, Haiping Wang
semanticscholar   +1 more source

Physical-Layer Security for Intelligent-Reflecting-Surface-Aided Wireless-Powered Communication Systems

IEEE Internet of Things Journal, 2023
This article investigates physical-layer security (PLS) of a typical wireless-powered communication (WPC) system with the aid of intelligent reflecting surface (IRS) in the presence of a passive eavesdropper for Internet of Things (IoT), and proposes ...
Kunrui Cao   +6 more
semanticscholar   +1 more source

Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems

IEEE Transactions on Vehicular Technology, 2021
This article studies the reliable and secure communications for a wireless-powered non-orthogonal multiple access (NOMA) system in the presence of multiple eavesdroppers.
Kunrui Cao   +6 more
semanticscholar   +1 more source

Secure Wireless-Powered NOMA Communications in Multi-UAV Systems

IEEE Transactions on Green Communications and Networking, 2023
This paper investigates the green and secure communications of multi-UAV NOMA systems. A joint energy transfer and artificial noise (ETAN) scheme is proposed to enhance the endurance and secrecy performance of the system. In particular, communication can
Danyu Diao   +5 more
semanticscholar   +1 more source

Intelligent Reflecting Surface Aided Secure Communications for NOMA Networks

IEEE Transactions on Vehicular Technology, 2022
Intelligent reflecting surface (IRS) is deemed a promising technique for future wireless and mobile technologies due to its ability to reconfigure the radio propagation environment.
Caihong Gong   +5 more
semanticscholar   +1 more source

Enhancing Reliability and Security of UAV-Enabled NOMA Communications With Power Allocation and Aerial Jamming

IEEE Transactions on Vehicular Technology, 2022
In view of the scarce spectrum resources and inconvenient deployment in wireless communications, this work focuses on an unmanned aerial vehicle (UAV) enabled non-orthogonal multiple access (NOMA) system where a UAV deployed as a base station serves two ...
Danyu Diao   +4 more
semanticscholar   +1 more source

Physical Layer Security for Cognitive Multiuser Networks With Hardware Impairments and Channel Estimation Errors

IEEE Transactions on Communications, 2022
In this paper, we investigate the physical layer security for a cognitive multiuser network which is composed of multiple cognitive sources, a cognitive destination and an eavesdropper under the joint impact of hardware impairments (HIs) and channel ...
Xiao Jiang   +4 more
semanticscholar   +1 more source

Maximizing effective secrecy throughput in SLIPT-based underwater wireless optical communication systems with artificial noise.

Applied Optics
In this paper, we investigate the physical layer security of a vertical relay-assisted underwater wireless optical communication system with simultaneous lightwave information and power transfer and artificial noise to enhance both security and energy ...
Gan Li, Tao Shang, Tang Tang, Qian Li
semanticscholar   +1 more source

Effective secrecy throughput optimization for GTLS-based UWOC systems with eavesdropper outage constraint.

Optics Express
In this work, the effective secrecy throughput (EST) which explicitly captures both the reliability and secrecy features of wiretap channels for an underwater wireless optical communication (UWOC) system has been optimized by considering the generalized ...
B. Zhou   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy