Results 11 to 20 of about 1,954 (175)

On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input [PDF]

open access: yesIEEE Transactions on Communications, 2012
This work investigates the effect of finite-alphabet source input on the secrecy rate of a multi-antenna wiretap system. Existing works have characterized maximum achievable secrecy rate or secrecy capacity for single and multiple antenna systems based ...
Bashar, Shafi   +2 more
core   +5 more sources

RIS-Aided Physical Layer Security With Full-Duplex Jamming in Underlay D2D Networks

open access: yesIEEE Access, 2021
This paper investigates the physical layer security and data transmission for the underlay device-to-device (D2D) networks, and considers a combination of the reconfigurable intelligent surface (RIS) and full-duplex (FD) jamming receiver for the ...
Waqas Khalid   +4 more
doaj   +1 more source

Secure Transmission With Aid of a Helper for MIMOME Network Having Finite Alphabet Inputs

open access: yesIEEE Access, 2017
This paper considers secure transmission with the aid of a helper for finite alphabet signals in multiple-input-multiple-output multiple antenna eavesdropper networks, where the helper transmits a jamming signal along with the confidential message sent ...
Kuo Cao   +3 more
doaj   +1 more source

Performance analysis of physical layer security based on channel correlation

open access: yesTongxin xuebao, 2021
In view of the correlation of the main and eavesdropper’s channels in physical layer security, the impact of channel correlation on the secrecy performance was studied, the exact form ulations of ergodic secrecy capacity and secrecy outage probability ...
Xuanli WU   +3 more
doaj   +2 more sources

Physical Layer Security with Threshold-Based Multiuser Scheduling in Multi-antenna Wireless Networks [PDF]

open access: yes, 2016
In this paper, we consider a multiuser downlink wiretap network consisting of one base station (BS) equipped with AA antennas, NB single-antenna legitimate users, and NE single-antenna eavesdroppers over Nakagami-m fading channels.
Duong, Trung Q.   +4 more
core   +1 more source

On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels with Opportunistic Scheduling [PDF]

open access: yesIEEE Communications Letters, 2014
In this letter, we study on-off opportunistic beamforming for the multiuser downlink channel with a passive eavesdropper. Two opportunistic scheduling schemes exploiting multiuser diversity are investigated which require limited feedback of the effective signal-to-noise ratio (SNR) from the legitimate users.
Minyan Pei   +3 more
openaire   +1 more source

Ergodic Secrecy Rate of RIS-Assisted Communication Systems in the Presence of Discrete Phase Shifts and Multiple Eavesdroppers [PDF]

open access: yesIEEE Wireless Communications Letters, 2021
This letter investigates the ergodic secrecy rate (ESR) of a reconfigurable intelligent surface (RIS)-assisted communication system in the presence of discrete phase shifts and multiple eavesdroppers (Eves). In particular, a closed-form approximation of the ESR is derived for both non-colluding and colluding Eves. The analytical results are shown to be
Peng Xu   +3 more
openaire   +4 more sources

Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback [PDF]

open access: yes, 2013
Channel state information (CSI) at the transmitter is of importance to the performance of physical layer security based on multi-antenna networks. Specifically, CSI is not only beneficial to improve the capacity of the legitimate channel, but also can be
Chen, Xiaoming, Yin, Rui
core   +1 more source

Secrecy Performance Analysis of Artificial-Noise-Aided Spatial Modulation in the Presence of Imperfect CSI

open access: yesIEEE Access, 2018
The security of information over wireless channels has always been an important aspect of wireless communication research. In this paper, the secrecy performance of a spatial modulated system with an artificial noise is investigated over the Rayleigh ...
Xiangbin Yu   +5 more
doaj   +1 more source

Enhancing secrecy rates in a wiretap channel

open access: yesDigital Communications and Networks, 2020
Reliable communication imposes an upper limit on the achievable rate, namely the Shannon capacity. Wyner's wiretap coding ensures a security constraint and reliability, but results in a decrease of achievable rate.
Shahid M. Shah, Vinod Sharma
doaj   +1 more source

Home - About - Disclaimer - Privacy