Results 31 to 40 of about 18,041 (194)

On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input [PDF]

open access: yes, 2012
This work investigates the effect of finite-alphabet source input on the secrecy rate of a multi-antenna wiretap system. Existing works have characterized maximum achievable secrecy rate or secrecy capacity for single and multiple antenna systems based ...
Bashar, Shafi   +2 more
core   +3 more sources

Secure Cooperative Single Carrier Systems Under Unreliable Backhaul and Dense Networks Impact

open access: yesIEEE Access, 2017
In this paper, the impacts of unreliable backhaul links on the secrecy performance of cooperative single carrier heterogeneous networks in the presence of eavesdroppers are investigated.
Huy T. Nguyen   +4 more
doaj   +1 more source

Secure Energy Harvesting Relay Networks With Unreliable Backhaul Connections

open access: yesIEEE Access, 2018
Wireless backhaul is a cost-effective and flexible alternative to wired backhaul, yet it suffers from unreliability. This paper studies the secrecy performance of a relay network with such unreliable wireless backhaul.
Cheng Yin   +5 more
doaj   +1 more source

Transmitter selection for secrecy against colluding eavesdroppers with backhaul uncertainty

open access: yesIET Communications, 2023
Due to the exponential growth of interconnected devices and reduced cell coverage, beyond fifth‐generation networks will be dense. Thus, instead of wired backhaul, wireless backhaul will be cost‐effective and flexible.
Burhan Wafai, Ankit Dubey, Chinmoy Kundu
doaj   +1 more source

UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective [PDF]

open access: yes, 2019
Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In this case, the management of multiple UAVs is important.
Chen, Yunfei   +3 more
core   +2 more sources

Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper [PDF]

open access: yes, 2012
This paper investigates reliable and covert transmission strategies in a multiple-input multiple-output (MIMO) wiretap channel with a transmitter, receiver and an adversarial wiretapper, each equipped with multiple antennas.
Mukherjee, Amitav, Swindlehurst, A. Lee
core   +1 more source

Physical Layer Security in Random NOMA-Enabled Heterogeneous Networks

open access: yesIEEE Open Journal of the Communications Society
The performance of physical layer secrecy approach in non-orthogonal multiple access (NOMA)-enabled heterogeneous networks (HetNets) is analyzed in this paper. A K-tier multi-cell HetNet is considered, comprising NOMA adopted in all tiers.
Elmira Shahraki   +2 more
doaj   +1 more source

Secrecy Analysis and Active Pilot Spoofing Attack Detection for Multigroup Multicasting Cell-Free Massive MIMO Systems

open access: yesIEEE Access, 2019
In this paper, we investigate the secure transmission in multigroup multicasting cell-free massive MIMO system in the presence of pilot spoofing attack.
Xianyu Zhang   +4 more
doaj   +1 more source

Securing Downlink Massive MIMO-NOMA Networks with Artificial Noise

open access: yes, 2019
In this paper, we focus on securing the confidential information of massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks by exploiting artificial noise (AN). An uplink training scheme is first proposed with minimum
Dobre, Octavia A.   +3 more
core   +1 more source

Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer [PDF]

open access: yesAUT Journal of Electrical Engineering, 2016
—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the ...
Ali kuhestani   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy