Results 21 to 30 of about 18,041 (194)
Performance analysis of physical layer security based on channel correlation
In view of the correlation of the main and eavesdropper’s channels in physical layer security, the impact of channel correlation on the secrecy performance was studied, the exact form ulations of ergodic secrecy capacity and secrecy outage probability ...
Xuanli WU +3 more
doaj +2 more sources
Physical Layer Security with Threshold-Based Multiuser Scheduling in Multi-antenna Wireless Networks [PDF]
In this paper, we consider a multiuser downlink wiretap network consisting of one base station (BS) equipped with AA antennas, NB single-antenna legitimate users, and NE single-antenna eavesdroppers over Nakagami-m fading channels.
Duong, Trung Q. +4 more
core +1 more source
On the Secrecy Rate of Downlink NOMA in Underlay Spectrum Sharing with Imperfect CSI: Invited Paper [PDF]
In this paper, we present the ergodic sum secrecy rate (ESSR) analysis of an underlay spectrum sharing nonorthogonal multiple access (NOMA) system. We consider the scenario where the power transmitted by the secondary transmitter (ST) is constrained by ...
Vaibhav Kumar +3 more
semanticscholar +1 more source
The security of information over wireless channels has always been an important aspect of wireless communication research. In this paper, the secrecy performance of a spatial modulated system with an artificial noise is investigated over the Rayleigh ...
Xiangbin Yu +5 more
doaj +1 more source
Enhancing secrecy rates in a wiretap channel
Reliable communication imposes an upper limit on the achievable rate, namely the Shannon capacity. Wyner's wiretap coding ensures a security constraint and reliability, but results in a decrease of achievable rate.
Shahid M. Shah, Vinod Sharma
doaj +1 more source
In this work, the secrecy of a typical wireless cooperative dual‐hop non‐orthogonal multiple access (NOMA)‐enabled decode‐and‐forward (DF) relay network is investigated with the impact of collaborative and non‐collaborative eavesdropping.
V. Narasimha Nayak, Kiran Kumar Gurrala
doaj +1 more source
To reduce the number of radio-frequency chains of base station, the use of finite resolution analog beamforming is desirbale in massive multiple-input multiple-output system.
Xianyu Zhang +3 more
doaj +1 more source
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin +5 more
core +3 more sources
In this article, the secure communication in cell-free massive multiple-input multiple-output system with low-resolution analog-to-digital converters is investigated in the presence of an active eavesdropper.
Xianyu Zhang +3 more
doaj +1 more source
We discuss the physical layer security scheme in the Full-Duplex (FD) MIMO point-to-point two-way communication system with residual self-interference, in which legitimate nodes send confidential information and null space Artificial Noise (AN) while ...
Weijia Lei, Yang Zhou, Xiuzhen Lin
doaj +1 more source

