Results 41 to 50 of about 1,954 (175)
Secure Massive MIMO Transmission with an Active Eavesdropper [PDF]
In this paper, we investigate secure and reliable transmission strategies for multi-cell multi-user massive multiple-input multiple-output (MIMO) systems with a multi-antenna active eavesdropper.
Caire, Giuseppe +4 more
core +3 more sources
Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies for improving spectral efficiency and energy efficiency, respectively.
Yuan Ren +3 more
doaj +1 more source
Physical Layer Security for Massive MIMO Systems Impaired by Phase Noise
In this paper, we investigate the impact of phase noise on the secrecy performance of downlink massive MIMO systems in the presence of a passive multiple-antenna eavesdropper.
Bhargava, Vijay K. +2 more
core +1 more source
Secrecy Balancing over Two-User MISO Interference Channels with Rician Fading
This paper considers a 2-user multiple-input single-output (MISO) interference channel with confidential messages (IFC-CM), in which the Rician channel model is assumed.
Jiqing Ni +5 more
doaj +1 more source
Transmit beamforming (TBF) has been proposed as an effective approach to enhance the security performance of multiple-input single-output (MISO) wiretap channels. However, this secrecy enhancement comes at some expenses, such as power consumption and the
Morteza Soltani, Huseyin Arslan
doaj +1 more source
Impact of Imperfect Angle Estimation on Spatial and Directional Modulation
In this paper, we investigate the impact of imperfect angle estimation (IAE) on spatial and directional modulation (SDM) systems, assuming that the signal experiences line of sight (LoS) propagation.
Hongyan Zhang +3 more
doaj +1 more source
In this paper, Time-Reversal (TR) pre-coding with Artificial Noise (AN) injection is proposed to enhance the physical layer security (PLS) performance in orthogonal Frequency Division Multiplexing-Differential Chaos Shift Keying (OFDM-DCSK) system, which
Dhuha Hussein Hameed, Fadhil S. Hasan
doaj +1 more source
Optimal Transmit Antenna Selection for Massive MIMO Wiretap Channels
In this paper, we study the impacts of transmit antenna selection on the secrecy performance of massive MIMO systems. We consider a wiretap setting in which a fixed number of transmit antennas are selected and then confidential messages are transmitted ...
Asaad, Saba +4 more
core +1 more source
When is a Function Securely Computable? [PDF]
A subset of a set of terminals that observe correlated signals seek to compute a given function of the signals using public communication. It is required that the value of the function be kept secret from an eavesdropper with access to the communication.
Gupta, Piyush +2 more
core +1 more source
Physical Layer Security Using Two-Path Successive Relaying
Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this ...
Qian Yu Liau, Chee Yen Leow, Zhiguo Ding
doaj +1 more source

