Results 31 to 40 of about 1,954 (175)
Secure Energy Harvesting Relay Networks With Unreliable Backhaul Connections
Wireless backhaul is a cost-effective and flexible alternative to wired backhaul, yet it suffers from unreliability. This paper studies the secrecy performance of a relay network with such unreliable wireless backhaul.
Cheng Yin +5 more
doaj +1 more source
Transmitter selection for secrecy against colluding eavesdroppers with backhaul uncertainty
Due to the exponential growth of interconnected devices and reduced cell coverage, beyond fifth‐generation networks will be dense. Thus, instead of wired backhaul, wireless backhaul will be cost‐effective and flexible.
Burhan Wafai, Ankit Dubey, Chinmoy Kundu
doaj +1 more source
Physical Layer Security in Random NOMA-Enabled Heterogeneous Networks
The performance of physical layer secrecy approach in non-orthogonal multiple access (NOMA)-enabled heterogeneous networks (HetNets) is analyzed in this paper. A K-tier multi-cell HetNet is considered, comprising NOMA adopted in all tiers.
Elmira Shahraki +2 more
doaj +1 more source
Securing Downlink Massive MIMO-NOMA Networks with Artificial Noise
In this paper, we focus on securing the confidential information of massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks by exploiting artificial noise (AN). An uplink training scheme is first proposed with minimum
Dobre, Octavia A. +3 more
core +1 more source
In this paper, we investigate the secure transmission in multigroup multicasting cell-free massive MIMO system in the presence of pilot spoofing attack.
Xianyu Zhang +4 more
doaj +1 more source
Secure Transmission in Multi-Cell Massive MIMO Systems
In this paper, we consider physical layer security provisioning in multi-cell massive multiple-input multiple-output (MIMO) systems. Specifically, we consider secure downlink transmission in a multi-cell massive MIMO system with matched-filter precoding ...
Bhargava, Vijay K. +2 more
core +1 more source
A new achievable ergodic secrecy rate region for the fading multiple access wiretap channel [PDF]
We give a new achievable ergodic secrecy rate region for the two-user fading multiple access wiretap channel. Our scheme creates a vector channel between the two transmitters and the intended receiver that has full-rank and creates another vector channel between the two transmitters and the eavesdropper whose rank is 1.
Raef Bassily, Sennur Ulukus
openaire +1 more source
Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer [PDF]
—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the ...
Ali kuhestani +2 more
doaj +1 more source
Secure Massive MIMO Transmission in the Presence of an Active Eavesdropper [PDF]
In this paper, we investigate secure and reliable transmission strategies for multi-cell multi-user massive multiple-input multiple-output (MIMO) systems in the presence of an active eavesdropper.
Caire, Giuseppe +4 more
core +3 more sources
Effects of CSI Knowledge on Secrecy of Threshold-Selection Decode-and-Forward Relaying
This paper considers secrecy of a three node cooperative wireless system in the presence of a passive eavesdropper. The threshold-selection decode-and-forward relay is considered, which can decode the source message correctly only if a predefined signal ...
Chinmoy Kundu +5 more
doaj +1 more source

