Results 91 to 100 of about 18,041 (194)

Secrecy sum-rate analysis of massive MIMO systems under dual-threat attacks using normalization methods

open access: yesDigital Communications and Networks, 2019
Massive Multiple Input Multiple Output (MIMO) has been considered as an emerging technology to enhance the spectral and energy efficiency for the upcoming wireless communication systems.
Kishan Neupane, Rami J. Haddad
doaj   +1 more source

Secrecy Enhancement of Cooperative NOMA Networks With Two-Way Untrusted Relaying

open access: yesIEEE Access, 2020
The two-way relaying (TWR) technique has been confirmed to achieve higher spectral efficiency and average sum rate compared with the one-way relaying (OWR) technique in ultra-dense next generation networks with limited spectal resources.
Mona Awad   +5 more
doaj   +1 more source

Fading Cognitive Multiple-Access Channels With Confidential Messages

open access: yes, 2009
The fading cognitive multiple-access channel with confidential messages (CMAC-CM) is investigated, in which two users attempt to transmit common information to a destination and user 1 also has confidential information intended for the destination.
Liang, Yingbin   +2 more
core   +1 more source

Enhancing Security of Primary User in Underlay Cognitive Radio Networks With Secondary User Selection

open access: yesIEEE Access, 2018
This paper investigates the effect of multiuser gain provided by the secondary user selection on the secrecy performance of the primary users. We first propose a simple scheme where the user with the minimal interference channel is selected, and derive a
Mian Qin   +3 more
doaj   +1 more source

On the Secrecy Capacity of Fading Channels

open access: yes, 2006
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized
Gamal, Hesham El   +2 more
core   +2 more sources

Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination

open access: yesTongxin xuebao, 2018
The cooperative relay technique in the field of physical layer security is widely concerned by the academic community,due to the advantages of increasing the network capacity and expanding the network coverage.However,cooperative relays may play as ...
Rui ZHAO   +4 more
doaj   +2 more sources

Secrecy Rates and Optimal Power Allocation for Full-Duplex Decode-and-Forward Relay Wire-Tap Channels

open access: yesIEEE Access, 2017
This paper investigates the secrecy rates and optimal power allocation schemes for a decode-and-forward wiretap relay channel where the transmission from a source to a destination is aided by a relay operating in a full-duplex (FD) mode under practical ...
Lubna Elsaid   +4 more
doaj   +1 more source

Chaos-Based Dual-Function OTFS: Joint Security and PAPR Reduction for LEO Satellite Communications

open access: yesIEEE Access
Orthogonal time frequency space (OTFS) modulation is emerging as a strong candidate for Low Earth Orbit (LEO) satellite communication systems due to its ability to counter Doppler and delay impairments, enabling reliable performance in high-mobility ...
Imran Younas, Nawaf Qasem Hamood Othman
doaj   +1 more source

Secure transmission scheme for RIS enabled bi-staticISAC system based on statistical CSI

open access: yes物联网学报
Considering the issues of communication and sensing securities for the reconfigurable intelligent surface (RIS) enabled integrated sensing and communication system, a joint design for the transmit covariance matrix and the reflection matrix of the RIS is
LIU Yilong, ZHANG Jun, NI Yiyang
doaj  

Home - About - Disclaimer - Privacy