Results 21 to 30 of about 1,954 (175)
In this work, the secrecy of a typical wireless cooperative dual‐hop non‐orthogonal multiple access (NOMA)‐enabled decode‐and‐forward (DF) relay network is investigated with the impact of collaborative and non‐collaborative eavesdropping.
V. Narasimha Nayak, Kiran Kumar Gurrala
doaj +1 more source
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin +5 more
core +5 more sources
Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading
Node selection is a simple technique to achieve diversity and thereby enhance the physical layer security in future wireless communication systems which require low complexity. High-speed data transmission often encounters frequency selective fading. In this context, we evaluate the exact closed-form expression for the ergodic secrecy rate (ESR) of the
Shashi Bhushan Kotwal +4 more
openaire +2 more sources
To reduce the number of radio-frequency chains of base station, the use of finite resolution analog beamforming is desirbale in massive multiple-input multiple-output system.
Xianyu Zhang +3 more
doaj +1 more source
Secrecy Rate Region Enhancement in Multiple Access Wiretap Channel
It is commonly known that physical layer security is achieved with a trade-off in terms of the achievable rate. Hence, security constraints generate rate losses in wiretap channels.
Shahid Mehraj Shah
doaj +1 more source
In this article, the secure communication in cell-free massive multiple-input multiple-output system with low-resolution analog-to-digital converters is investigated in the presence of an active eavesdropper.
Xianyu Zhang +3 more
doaj +1 more source
We discuss the physical layer security scheme in the Full-Duplex (FD) MIMO point-to-point two-way communication system with residual self-interference, in which legitimate nodes send confidential information and null space Artificial Noise (AN) while ...
Weijia Lei, Yang Zhou, Xiuzhen Lin
doaj +1 more source
UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective [PDF]
Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In this case, the management of multiple UAVs is important.
Chen, Yunfei +3 more
core +2 more sources
Secure Cooperative Single Carrier Systems Under Unreliable Backhaul and Dense Networks Impact
In this paper, the impacts of unreliable backhaul links on the secrecy performance of cooperative single carrier heterogeneous networks in the presence of eavesdroppers are investigated.
Huy T. Nguyen +4 more
doaj +1 more source
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper [PDF]
This paper investigates reliable and covert transmission strategies in a multiple-input multiple-output (MIMO) wiretap channel with a transmitter, receiver and an adversarial wiretapper, each equipped with multiple antennas.
Mukherjee, Amitav, Swindlehurst, A. Lee
core +1 more source

