Results 61 to 70 of about 1,954 (175)

Secrecy Capacity Region of Fading Broadcast Channels

open access: yes, 2007
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1.
Liang, Yingbin   +2 more
core   +2 more sources

Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks

open access: yes, 2013
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's ...
Shen, Weiming   +2 more
core   +1 more source

Ergodic Secrecy Rate of Antenna-Selection-Aided MIMOME Channels with BPSK/QPSK Modulations

open access: yes, 2019
This paper analyzes transmit antenna selection (TAS) under Rayleigh flat fading for BPSK/QPSK modulations in multiple-input multiple-output wiretap channels, also termed as multiple-input multiple-output multiple-eavesdropper (MIMOME) channels. In our protocol, a single antenna is selected to transmit the secret message and selection combing (SC) or ...
Ouyang, Chongjun   +5 more
openaire   +2 more sources

Secrecy Performance of Wireless Powered Communication Networks With Multiple Eavesdroppers and Outdated CSI

open access: yesIEEE Access, 2018
In this paper, we present a comprehensive secrecy performance analysis of wireless powered communication networks with multiple eavesdroppers, where an energy-limited information source with multiple antennas harvests the radio frequency energy from a ...
Yuzhen Huang   +3 more
doaj   +1 more source

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

open access: yes, 2014
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence
Fakoorian, S. A. A.   +3 more
core   +1 more source

Secure Wireless Information and Power Transfer Based on Tilt Adaptation in 3-D Massive MIMO Systems

open access: yesIEEE Access, 2019
In this paper, we investigate a secure transmission algorithm exploiting the vertical domain for simultaneous wireless information and power transfer (SWIPT) in a massive multiple-input multiple-output system over Rician fading channels. Each user adopts
Lixing Fan   +3 more
doaj   +1 more source

Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel

open access: yes, 2015
Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interests for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication issue arises
Liu, Liang, Xing, Hong, Zhang, Rui
core   +1 more source

Secure Performance Analysis of Satellite-Terrestrial Networks-Assisted Backscatter Device

open access: yesJordanian Journal of Computers and Information Technology
This study investigates the secrecy performance of a satellite–backscatter device communication system in the presence of a potential eavesdropper.
Hong Nhu Nguyen   +4 more
doaj   +1 more source

Secrecy sum-rate analysis of massive MIMO systems under dual-threat attacks using normalization methods

open access: yesDigital Communications and Networks, 2019
Massive Multiple Input Multiple Output (MIMO) has been considered as an emerging technology to enhance the spectral and energy efficiency for the upcoming wireless communication systems.
Kishan Neupane, Rami J. Haddad
doaj   +1 more source

Artificial Noise Aided Precoding With Imperfect CSI in Full-Duplex Relaying Secure Communications

open access: yesIEEE Access, 2018
In Rayleigh fading channels, to enhance the secrecy performance of wireless communication systems and efficiently disturb the interception of eavesdroppers, the multiple-antenna source node utilizes the artificial noise aided precoding (ANP) strategy ...
Yuanjian Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy