Results 71 to 80 of about 1,954 (175)

Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection -- Secure DoF and Jammer Scaling Law

open access: yes, 2013
In this paper, we propose opportunistic jammer selection in a wireless security system for increasing the secure degrees of freedom (DoF) between a transmitter and a legitimate receiver (say, Alice and Bob).
Choi, Wan, Lee, Jung Hoon
core   +1 more source

Secrecy Enhancement of Cooperative NOMA Networks With Two-Way Untrusted Relaying

open access: yesIEEE Access, 2020
The two-way relaying (TWR) technique has been confirmed to achieve higher spectral efficiency and average sum rate compared with the one-way relaying (OWR) technique in ultra-dense next generation networks with limited spectal resources.
Mona Awad   +5 more
doaj   +1 more source

Linear Precoding for Broadcast Channels with Confidential Messages under Transmit-Side Channel Correlation

open access: yes, 2013
In this paper, we analyze the performance of regularized channel inversion (RCI) precoding in multiple-input single-output (MISO) broadcast channels with confidential messages under transmit-side channel correlation.
Al-nahari, Azzam Y.   +3 more
core   +1 more source

Enhancing Security of Primary User in Underlay Cognitive Radio Networks With Secondary User Selection

open access: yesIEEE Access, 2018
This paper investigates the effect of multiuser gain provided by the secondary user selection on the secrecy performance of the primary users. We first propose a simple scheme where the user with the minimal interference channel is selected, and derive a
Mian Qin   +3 more
doaj   +1 more source

On the Secrecy Capacity of Fading Channels

open access: yes, 2006
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized
Gamal, Hesham El   +2 more
core   +2 more sources

Secrecy Through Synchronization Errors

open access: yes, 2015
In this paper, we propose a transmission scheme that achieves information theoretic security, without making assumptions on the eavesdropper's channel. This is achieved by a transmitter that deliberately introduces synchronization errors (insertions and ...
Castiglione, Jason, Kavcic, Aleksandar
core   +1 more source

Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination

open access: yesTongxin xuebao, 2018
The cooperative relay technique in the field of physical layer security is widely concerned by the academic community,due to the advantages of increasing the network capacity and expanding the network coverage.However,cooperative relays may play as ...
Rui ZHAO   +4 more
doaj   +2 more sources

Secrecy Rates and Optimal Power Allocation for Full-Duplex Decode-and-Forward Relay Wire-Tap Channels

open access: yesIEEE Access, 2017
This paper investigates the secrecy rates and optimal power allocation schemes for a decode-and-forward wiretap relay channel where the transmission from a source to a destination is aided by a relay operating in a full-duplex (FD) mode under practical ...
Lubna Elsaid   +4 more
doaj   +1 more source

Chaos-Based Dual-Function OTFS: Joint Security and PAPR Reduction for LEO Satellite Communications

open access: yesIEEE Access
Orthogonal time frequency space (OTFS) modulation is emerging as a strong candidate for Low Earth Orbit (LEO) satellite communication systems due to its ability to counter Doppler and delay impairments, enabling reliable performance in high-mobility ...
Imran Younas, Nawaf Qasem Hamood Othman
doaj   +1 more source

Secure transmission scheme for RIS enabled bi-staticISAC system based on statistical CSI

open access: yes物联网学报
Considering the issues of communication and sensing securities for the reconfigurable intelligent surface (RIS) enabled integrated sensing and communication system, a joint design for the transmit covariance matrix and the reflection matrix of the RIS is
LIU Yilong, ZHANG Jun, NI Yiyang
doaj  

Home - About - Disclaimer - Privacy