Results 21 to 30 of about 1,954 (175)

Power allocation‐Assisted secrecy analysis for NOMA enabled cooperative network under multiple eavesdroppers

open access: yesETRI Journal, 2021
In this work, the secrecy of a typical wireless cooperative dual‐hop non‐orthogonal multiple access (NOMA)‐enabled decode‐and‐forward (DF) relay network is investigated with the impact of collaborative and non‐collaborative eavesdropping.
V. Narasimha Nayak, Kiran Kumar Gurrala
doaj   +1 more source

Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]

open access: yes, 2017
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin   +5 more
core   +5 more sources

Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading

open access: yesIEEE Transactions on Vehicular Technology, 2023
Node selection is a simple technique to achieve diversity and thereby enhance the physical layer security in future wireless communication systems which require low complexity. High-speed data transmission often encounters frequency selective fading. In this context, we evaluate the exact closed-form expression for the ergodic secrecy rate (ESR) of the
Shashi Bhushan Kotwal   +4 more
openaire   +2 more sources

Secure downlink transmission with finite resolution analog beamforming in massive multiple-input multiple-output system

open access: yesInternational Journal of Distributed Sensor Networks, 2018
To reduce the number of radio-frequency chains of base station, the use of finite resolution analog beamforming is desirbale in massive multiple-input multiple-output system.
Xianyu Zhang   +3 more
doaj   +1 more source

Secrecy Rate Region Enhancement in Multiple Access Wiretap Channel

open access: yesJournal of Telecommunications and Information Technology, 2022
It is commonly known that physical layer security is achieved with a trade-off in terms of the achievable rate. Hence, security constraints generate rate losses in wiretap channels.
Shahid Mehraj Shah
doaj   +1 more source

Secure performance analysis and pilot spoofing attack detection in cell-free massive MIMO systems with finite-resolution ADCs

open access: yesInternational Journal of Distributed Sensor Networks, 2022
In this article, the secure communication in cell-free massive multiple-input multiple-output system with low-resolution analog-to-digital converters is investigated in the presence of an active eavesdropper.
Xianyu Zhang   +3 more
doaj   +1 more source

A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI

open access: yesDigital Communications and Networks, 2021
We discuss the physical layer security scheme in the Full-Duplex (FD) MIMO point-to-point two-way communication system with residual self-interference, in which legitimate nodes send confidential information and null space Artificial Noise (AN) while ...
Weijia Lei, Yang Zhou, Xiuzhen Lin
doaj   +1 more source

UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective [PDF]

open access: yes, 2019
Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In this case, the management of multiple UAVs is important.
Chen, Yunfei   +3 more
core   +2 more sources

Secure Cooperative Single Carrier Systems Under Unreliable Backhaul and Dense Networks Impact

open access: yesIEEE Access, 2017
In this paper, the impacts of unreliable backhaul links on the secrecy performance of cooperative single carrier heterogeneous networks in the presence of eavesdroppers are investigated.
Huy T. Nguyen   +4 more
doaj   +1 more source

Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper [PDF]

open access: yes, 2012
This paper investigates reliable and covert transmission strategies in a multiple-input multiple-output (MIMO) wiretap channel with a transmitter, receiver and an adversarial wiretapper, each equipped with multiple antennas.
Mukherjee, Amitav, Swindlehurst, A. Lee
core   +1 more source

Home - About - Disclaimer - Privacy