Results 111 to 120 of about 1,643 (150)
Some of the next articles are maybe not open access.
Effective Secrecy Throughput Maximization for WPT Enabled IoT in the FBL Regime
2024 10th International Conference on Computer and Communications (ICCC)The inherent broadcast nature of wireless communication makes data transmissions vulnerable to eavesdropping, creating a critical need to balance communication reliability with security.
Ning Guo +5 more
semanticscholar +1 more source
Secure Communication in NOMA-Assisted Millimeter-Wave SWIPT UAV Networks
IEEE Internet of Things Journal, 2020Future wireless networks have requirements of large connections, low power consumption, high reliability, and strong security. Considering the abundant available bandwidth of millimeter wave (mmWave) and the large line-of-sight (LOS) link probability of ...
Xiaoli Sun, Weiwei Yang, Yueming Cai
semanticscholar +1 more source
Secure Transmission for NOMA-Based Cognitive Radio Networks With Imperfect CSI
IEEE Communications Letters, 2021This letter studies the secure transmission issue of non-orthogonal multiple access (NOMA) based cognitive radio networks (CRNs) with imperfect channel state information (CSI), where the secondary user (SU) transmitter aims to transmit the normalized ...
Zhihui Shang +4 more
semanticscholar +1 more source
Secrecy Analysis and Optimization of UAV-Assisted IoT Networks With RF-EH and Imperfect Hardware
IEEE Internet of Things JournalThis article introduces uncrewed aerial vehicles (UAVs) assisted communication system for energy-constrained Internet of Things (IoT) devices. Herein, a power beacon transmits radio frequency (RF) signals to enable energy harvesting at the IoT devices ...
Gaurav Kumar Pandey +4 more
semanticscholar +1 more source
Secrecy Analysis of RIS-Aided mmWave Systems over Independent Fluctuating Two-Ray Fading Channels
Asia-Pacific Conference on CommunicationsIn this paper, we examine a millimeter-wave (mmWave) wiretap scenario where a multiple-antenna base station (Alice) communicates with a legitimate user (Bob) via a reconfigurable intelligent surface, while multiple colluding eavesdroppers (Eves) attempt ...
Phuc V. Trinh, S. Sugiura
semanticscholar +1 more source
Secure Transmission in HARQ-Assisted Non-Orthogonal Multiple Access Networks
IEEE Transactions on Information Forensics and Security, 2020This paper investigates the secure transmission in hybrid automatic repeat request (HARQ)-assisted non-orthogonal multiple access (NOMA) networks, where a security-required (SR) user is paired with an opportunity-served (OS) user to perform NOMA ...
Zhongwu Xiang +5 more
semanticscholar +1 more source
Secure Transmission Design in HARQ Assisted Cognitive NOMA Networks
IEEE Transactions on Information Forensics and Security, 2020In this paper, we design a secure transmission scheme in hybrid automatic repeat request (HARQ) assisted cognitive non-orthogonal multiple access (NOMA) networks, where a security-required user (SRU) is paired with a quality of service (QoS)-sensitive ...
Zhongwu Xiang +4 more
semanticscholar +1 more source
An HARQ Assisted Cognitive NOMA Scheme for Secure Transmission With Imperfect SIC
IEEE Transactions on Communications, 2021This paper employs hybrid automatic repeat request (HARQ) to assist the cognitive non-orthogonal multiple access (NOMA) scheme for secure transmission in Internet of Things networks where the security-required (SR) users with high-security requirements ...
Zhongwu Xiang +5 more
semanticscholar +1 more source
Multiple Antennas-Based Secure Communications With Channel Inversion Power Control
IEEE Wireless Communications Letters, 2022In this letter, a multiple antennas-based truncated channel inversion power control (CIPC) secure transmission scheme with artificial noise (AN) is proposed. Specifically, the transmitter with multiple antennas varies the transmit power as per channel to
Jinsong Hu +4 more
semanticscholar +1 more source
IEEE Transactions on Communications
This paper investigates the physical layer security for a double-reconfigurable intelligent surface (DRIS) aided wireless-powered communication (WPC) system in the presence of an eavesdropper, where one RIS (termed as RIS-1) is deployed between power ...
Jingyu Chen +7 more
semanticscholar +1 more source
This paper investigates the physical layer security for a double-reconfigurable intelligent surface (DRIS) aided wireless-powered communication (WPC) system in the presence of an eavesdropper, where one RIS (termed as RIS-1) is deployed between power ...
Jingyu Chen +7 more
semanticscholar +1 more source

