Results 111 to 120 of about 1,643 (150)
Some of the next articles are maybe not open access.

Effective Secrecy Throughput Maximization for WPT Enabled IoT in the FBL Regime

2024 10th International Conference on Computer and Communications (ICCC)
The inherent broadcast nature of wireless communication makes data transmissions vulnerable to eavesdropping, creating a critical need to balance communication reliability with security.
Ning Guo   +5 more
semanticscholar   +1 more source

Secure Communication in NOMA-Assisted Millimeter-Wave SWIPT UAV Networks

IEEE Internet of Things Journal, 2020
Future wireless networks have requirements of large connections, low power consumption, high reliability, and strong security. Considering the abundant available bandwidth of millimeter wave (mmWave) and the large line-of-sight (LOS) link probability of ...
Xiaoli Sun, Weiwei Yang, Yueming Cai
semanticscholar   +1 more source

Secure Transmission for NOMA-Based Cognitive Radio Networks With Imperfect CSI

IEEE Communications Letters, 2021
This letter studies the secure transmission issue of non-orthogonal multiple access (NOMA) based cognitive radio networks (CRNs) with imperfect channel state information (CSI), where the secondary user (SU) transmitter aims to transmit the normalized ...
Zhihui Shang   +4 more
semanticscholar   +1 more source

Secrecy Analysis and Optimization of UAV-Assisted IoT Networks With RF-EH and Imperfect Hardware

IEEE Internet of Things Journal
This article introduces uncrewed aerial vehicles (UAVs) assisted communication system for energy-constrained Internet of Things (IoT) devices. Herein, a power beacon transmits radio frequency (RF) signals to enable energy harvesting at the IoT devices ...
Gaurav Kumar Pandey   +4 more
semanticscholar   +1 more source

Secrecy Analysis of RIS-Aided mmWave Systems over Independent Fluctuating Two-Ray Fading Channels

Asia-Pacific Conference on Communications
In this paper, we examine a millimeter-wave (mmWave) wiretap scenario where a multiple-antenna base station (Alice) communicates with a legitimate user (Bob) via a reconfigurable intelligent surface, while multiple colluding eavesdroppers (Eves) attempt ...
Phuc V. Trinh, S. Sugiura
semanticscholar   +1 more source

Secure Transmission in HARQ-Assisted Non-Orthogonal Multiple Access Networks

IEEE Transactions on Information Forensics and Security, 2020
This paper investigates the secure transmission in hybrid automatic repeat request (HARQ)-assisted non-orthogonal multiple access (NOMA) networks, where a security-required (SR) user is paired with an opportunity-served (OS) user to perform NOMA ...
Zhongwu Xiang   +5 more
semanticscholar   +1 more source

Secure Transmission Design in HARQ Assisted Cognitive NOMA Networks

IEEE Transactions on Information Forensics and Security, 2020
In this paper, we design a secure transmission scheme in hybrid automatic repeat request (HARQ) assisted cognitive non-orthogonal multiple access (NOMA) networks, where a security-required user (SRU) is paired with a quality of service (QoS)-sensitive ...
Zhongwu Xiang   +4 more
semanticscholar   +1 more source

An HARQ Assisted Cognitive NOMA Scheme for Secure Transmission With Imperfect SIC

IEEE Transactions on Communications, 2021
This paper employs hybrid automatic repeat request (HARQ) to assist the cognitive non-orthogonal multiple access (NOMA) scheme for secure transmission in Internet of Things networks where the security-required (SR) users with high-security requirements ...
Zhongwu Xiang   +5 more
semanticscholar   +1 more source

Multiple Antennas-Based Secure Communications With Channel Inversion Power Control

IEEE Wireless Communications Letters, 2022
In this letter, a multiple antennas-based truncated channel inversion power control (CIPC) secure transmission scheme with artificial noise (AN) is proposed. Specifically, the transmitter with multiple antennas varies the transmit power as per channel to
Jinsong Hu   +4 more
semanticscholar   +1 more source

Double-RIS Enabled Physical Layer Security for Wireless-Powered Communication Systems Over Rayleigh Fading Channels

IEEE Transactions on Communications
This paper investigates the physical layer security for a double-reconfigurable intelligent surface (DRIS) aided wireless-powered communication (WPC) system in the presence of an eavesdropper, where one RIS (termed as RIS-1) is deployed between power ...
Jingyu Chen   +7 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy