Results 11 to 20 of about 1,643 (150)

ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel

open access: yesIEEE Access, 2017
In this paper, a decoding method of joint zero-forcing and successive interference cancellation (ZF-SIC) is put forward to assist the study of the individual secrecy in the quasi-static Rayleigh fading single-input multiple-output multiple access wiretap
Kaiwei Jiang   +4 more
doaj   +2 more sources

SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels

open access: yesIEEE Access, 2018
A new paradigm of uplink non-orthogonal multiple access along with multiple eavesdroppers to achieve secrecy transmission is studied in this paper.
Kaiwei Jiang   +4 more
doaj   +2 more sources

Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping [PDF]

open access: yesIEEE Wireless Communications Letters, 2022
The application of successive interference cancellation (SIC) introduces critical security risks to cooperative non-orthogonal multiple access (NOMA) systems in the presence of untrustworthy network nodes, referred to as internal eavesdroppers.
Chorti, Arsenia   +4 more
core   +3 more sources

Individual secrecy of fading homogeneous multiple access wiretap channel with successive interference cancellation

open access: yesEURASIP Journal on Wireless Communications and Networking, 2017
We investigate individual secrecy performance in a K-user quasi-static Rayleigh fading homogeneous multiple access wiretap channel (MAC-WT), where a legitimate receiver employs successive interference cancellation (SIC) decoding.
Kaiwei Jiang   +4 more
doaj   +2 more sources

Optimization of Code Rates in SISOME Wiretap Channels [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2015
We propose a new framework for determining the wiretap code rates of single-input single-output multi-antenna eavesdropper (SISOME) wiretap channels when the capacity of the eavesdropper's channel is not available at the transmitter.
Geraci, Giovanni   +4 more
core   +2 more sources

Secrecy Performance Analysis of Hybrid RF/FSO System under Different Eavesdropping Strategies

open access: yesPhotonics
In this paper, we analyze the confidentiality of a hybrid radio frequency (RF)/free-space optical (FSO) system with regard to physical layer security (PLS). In this system, signals are transmitted between the source and destination using RF and FSO links,
Xinkang Song   +4 more
doaj   +2 more sources

Secrecy Performance of Overlay Cognitive Radio Inspired NOMA With Untrusted Secondary User

open access: yesIEEE Access
In this paper, we investigate the integration of physical layer security (PLS) and cognitive radio (CR) technologies with non-orthogonal multiple access (NOMA) to enhance spectral efficiency (SE) and security in fifth generation (5G) and beyond wireless ...
Swathi Priya Indraganti   +1 more
doaj   +2 more sources

Secrecy Performance Analysis of Energy Harvesting Untrusted Relay Networks with Hardware Impairments

open access: yesInternational Journal of Distributed Sensor Networks
In this work, we focus on the issue of secure communication in energy harvesting untrusted relay networks taking into account the impact of hardware impairments, where an energy-constrained relay, powered by received radio frequency signals, attempts to ...
Dechuan Chen   +5 more
doaj   +2 more sources

Physical Layer Security in Uplink NOMA Multi-Antenna Systems With Randomly Distributed Eavesdroppers

open access: yesIEEE Access, 2019
The physical layer security of uplink non-orthogonal multiple access (NOMA) is analyzed. A stochastic geometry approach is applied to analyze the coverage probability and effective secrecy throughput (EST) of the kth NOMA user, where a fixed or an ...
Gerardo Gomez   +4 more
doaj   +2 more sources

Power Allocation for Secure NOMA Network Based on Q-Learning

open access: yesIEEE Access
This paper investigates the secrecy performance of a multi-relay non-orthogonal multiple access (NOMA) network. Considering the presence of eavesdroppers, an optimal relay selection scheme and a jamming signal transmission scheme for both amplify-and ...
Weidong Guo, Xinyan Wang
doaj   +2 more sources

Home - About - Disclaimer - Privacy