Results 11 to 20 of about 2,245 (194)

RIS-Aided Physical Layer Security With Full-Duplex Jamming in Underlay D2D Networks

open access: yesIEEE Access, 2021
This paper investigates the physical layer security and data transmission for the underlay device-to-device (D2D) networks, and considers a combination of the reconfigurable intelligent surface (RIS) and full-duplex (FD) jamming receiver for the ...
Waqas Khalid   +4 more
doaj   +1 more source

Secure Beamforming and Ergodic Secrecy Rate Analysis for Amplify-and-Forward Relay Networks With Wireless Powered Jammer [PDF]

open access: yesIEEE Transactions on Vehicular Technology, 2021
In this correspondence, we consider an amplify-and-forward relay network in which relayed information is overheard by an eavesdropper. In order to confound the eavesdropper, a wireless-powered jammer is also considered which harvests energy from a multiple-antenna source.
Omer Waqar, Hina Tabassum, Raviraj Adve
openaire   +2 more sources

Secure Transmission With Aid of a Helper for MIMOME Network Having Finite Alphabet Inputs

open access: yesIEEE Access, 2017
This paper considers secure transmission with the aid of a helper for finite alphabet signals in multiple-input-multiple-output multiple antenna eavesdropper networks, where the helper transmits a jamming signal along with the confidential message sent ...
Kuo Cao   +3 more
doaj   +1 more source

Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback [PDF]

open access: yes, 2013
Channel state information (CSI) at the transmitter is of importance to the performance of physical layer security based on multi-antenna networks. Specifically, CSI is not only beneficial to improve the capacity of the legitimate channel, but also can be
Chen, Xiaoming, Yin, Rui
core   +1 more source

Performance analysis of physical layer security based on channel correlation

open access: yesTongxin xuebao, 2021
In view of the correlation of the main and eavesdropper’s channels in physical layer security, the impact of channel correlation on the secrecy performance was studied, the exact form ulations of ergodic secrecy capacity and secrecy outage probability ...
Xuanli WU   +3 more
doaj   +2 more sources

Physical Layer Security with Threshold-Based Multiuser Scheduling in Multi-antenna Wireless Networks [PDF]

open access: yes, 2016
In this paper, we consider a multiuser downlink wiretap network consisting of one base station (BS) equipped with AA antennas, NB single-antenna legitimate users, and NE single-antenna eavesdroppers over Nakagami-m fading channels.
Duong, Trung Q.   +4 more
core   +1 more source

On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels with Opportunistic Scheduling [PDF]

open access: yesIEEE Communications Letters, 2014
In this letter, we study on-off opportunistic beamforming for the multiuser downlink channel with a passive eavesdropper. Two opportunistic scheduling schemes exploiting multiuser diversity are investigated which require limited feedback of the effective signal-to-noise ratio (SNR) from the legitimate users.
Minyan Pei   +3 more
openaire   +1 more source

Ergodic Secrecy Rate of RIS-Assisted Communication Systems in the Presence of Discrete Phase Shifts and Multiple Eavesdroppers [PDF]

open access: yesIEEE Wireless Communications Letters, 2021
This letter investigates the ergodic secrecy rate (ESR) of a reconfigurable intelligent surface (RIS)-assisted communication system in the presence of discrete phase shifts and multiple eavesdroppers (Eves). In particular, a closed-form approximation of the ESR is derived for both non-colluding and colluding Eves. The analytical results are shown to be
Peng Xu   +3 more
openaire   +4 more sources

Enhancing secrecy rates in a wiretap channel

open access: yesDigital Communications and Networks, 2020
Reliable communication imposes an upper limit on the achievable rate, namely the Shannon capacity. Wyner's wiretap coding ensures a security constraint and reliability, but results in a decrease of achievable rate.
Shahid M. Shah, Vinod Sharma
doaj   +1 more source

Power allocation‐Assisted secrecy analysis for NOMA enabled cooperative network under multiple eavesdroppers

open access: yesETRI Journal, 2021
In this work, the secrecy of a typical wireless cooperative dual‐hop non‐orthogonal multiple access (NOMA)‐enabled decode‐and‐forward (DF) relay network is investigated with the impact of collaborative and non‐collaborative eavesdropping.
V. Narasimha Nayak, Kiran Kumar Gurrala
doaj   +1 more source

Home - About - Disclaimer - Privacy