RIS-Aided Physical Layer Security With Full-Duplex Jamming in Underlay D2D Networks
This paper investigates the physical layer security and data transmission for the underlay device-to-device (D2D) networks, and considers a combination of the reconfigurable intelligent surface (RIS) and full-duplex (FD) jamming receiver for the ...
Waqas Khalid +4 more
doaj +1 more source
Secure Beamforming and Ergodic Secrecy Rate Analysis for Amplify-and-Forward Relay Networks With Wireless Powered Jammer [PDF]
In this correspondence, we consider an amplify-and-forward relay network in which relayed information is overheard by an eavesdropper. In order to confound the eavesdropper, a wireless-powered jammer is also considered which harvests energy from a multiple-antenna source.
Omer Waqar, Hina Tabassum, Raviraj Adve
openaire +2 more sources
Secure Transmission With Aid of a Helper for MIMOME Network Having Finite Alphabet Inputs
This paper considers secure transmission with the aid of a helper for finite alphabet signals in multiple-input-multiple-output multiple antenna eavesdropper networks, where the helper transmits a jamming signal along with the confidential message sent ...
Kuo Cao +3 more
doaj +1 more source
Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback [PDF]
Channel state information (CSI) at the transmitter is of importance to the performance of physical layer security based on multi-antenna networks. Specifically, CSI is not only beneficial to improve the capacity of the legitimate channel, but also can be
Chen, Xiaoming, Yin, Rui
core +1 more source
Performance analysis of physical layer security based on channel correlation
In view of the correlation of the main and eavesdropper’s channels in physical layer security, the impact of channel correlation on the secrecy performance was studied, the exact form ulations of ergodic secrecy capacity and secrecy outage probability ...
Xuanli WU +3 more
doaj +2 more sources
Physical Layer Security with Threshold-Based Multiuser Scheduling in Multi-antenna Wireless Networks [PDF]
In this paper, we consider a multiuser downlink wiretap network consisting of one base station (BS) equipped with AA antennas, NB single-antenna legitimate users, and NE single-antenna eavesdroppers over Nakagami-m fading channels.
Duong, Trung Q. +4 more
core +1 more source
On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels with Opportunistic Scheduling [PDF]
In this letter, we study on-off opportunistic beamforming for the multiuser downlink channel with a passive eavesdropper. Two opportunistic scheduling schemes exploiting multiuser diversity are investigated which require limited feedback of the effective signal-to-noise ratio (SNR) from the legitimate users.
Minyan Pei +3 more
openaire +1 more source
Ergodic Secrecy Rate of RIS-Assisted Communication Systems in the Presence of Discrete Phase Shifts and Multiple Eavesdroppers [PDF]
This letter investigates the ergodic secrecy rate (ESR) of a reconfigurable intelligent surface (RIS)-assisted communication system in the presence of discrete phase shifts and multiple eavesdroppers (Eves). In particular, a closed-form approximation of the ESR is derived for both non-colluding and colluding Eves. The analytical results are shown to be
Peng Xu +3 more
openaire +4 more sources
Enhancing secrecy rates in a wiretap channel
Reliable communication imposes an upper limit on the achievable rate, namely the Shannon capacity. Wyner's wiretap coding ensures a security constraint and reliability, but results in a decrease of achievable rate.
Shahid M. Shah, Vinod Sharma
doaj +1 more source
In this work, the secrecy of a typical wireless cooperative dual‐hop non‐orthogonal multiple access (NOMA)‐enabled decode‐and‐forward (DF) relay network is investigated with the impact of collaborative and non‐collaborative eavesdropping.
V. Narasimha Nayak, Kiran Kumar Gurrala
doaj +1 more source

