Disguised Full-Duplex Covert Communications [PDF]
Covert communications have arisen as an effective communications security measure that overcomes some of the limitations of cryptography and physical layer security.
Jihwan Moon
doaj +4 more sources
In-band full duplex wireless medium access control (MAC) protocol is essential in order to enable higher layers of the protocol stack to exploit the maximum benefits from physical layer full duplex technology.
Md. Ruhul Amin +2 more
doaj +1 more source
Weighted Scheduling Algorithm Based on In-Band Full-Duplex Link for Distributed WLAN [PDF]
Aiming at the problem of link scheduling fairness in the in-band full-duplex access process of distributed wireless local area network (WLAN), a full-duplex link scheduling algorithm based on nodal scheduling weights (W-FD) is proposed.
GUAN Zheng, HU Yang, YANG Zhijun, HE Min
doaj +1 more source
Optimization Method for Physical Layer Secure Communication in SWIPT MIMO Full-Duplex System [PDF]
This paper studies the security problem in the Multiple-Input Multiple-Output(MIMO) communication system when the transmission of wireless information and power happens simultaneously.We first design the energy partitioning factors of the artificial ...
CHEN Keke, ZHAO Sai, TANG Dong
doaj +1 more source
FD-LTDA-MAC: Full-Duplex Unsynchronised Scheduling in Linear Underwater Acoustic Chain Networks
In-band full-duplex communication offers significant potential to enhance network performance. This paper presents the full-duplex linear transmit delay allocation MAC (FD-LTDA-MAC) protocol for full-duplex based underwater acoustic chain networks (FD ...
Aliyu Ahmed +3 more
doaj +1 more source
On Phase Noise Suppression in Full-Duplex Systems [PDF]
Oscillator phase noise has been shown to be one of the main performance limiting factors in full-duplex systems. In this paper, we consider the problem of self-interference cancellation with phase noise suppression in full-duplex systems. The feasibility
Ahmed, Elsayed, Eltawil, Ahmed M.
core +1 more source
Physical Layer Security Using Two-Path Successive Relaying
Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this ...
Qian Yu Liau, Chee Yen Leow, Zhiguo Ding
doaj +1 more source
RCFD: A Novel Channel Access Scheme for Full-Duplex Wireless Networks Based on Contention in Time and Frequency Domains [PDF]
In the last years, the advancements in signal processing and integrated circuits technology allowed several research groups to develop working prototypes of in-band full-duplex wireless systems.
Lahouti, Farshad +4 more
core +2 more sources
Self-Interference Cancellation with Nonlinear Distortion Suppression for Full-Duplex Systems [PDF]
In full-duplex systems, due to the strong self-interference signal, system nonlinearities become a significant limiting factor that bounds the possible cancellable self-interference power.
Ahmed, Elsayed +2 more
core +1 more source
Full-Duplex Mode in Amplify-and-Forward Relay Channels: Outage Probability and Ergodic Capacity
This paper investigates the outage probability and ergodic capacity performances for full-duplex mode in two-way amplify-and-forward relay channels. The two-way relay channels which consist of two source nodes and a single relay node working in full ...
Rongyi Hu +4 more
doaj +1 more source

