Results 1 to 10 of about 363,333 (172)

Rethinking the Intercept Probability of Random Linear Network Coding [PDF]

open access: yesIEEE Communications Letters, 2015
This letter considers a network comprising a transmitter, which employs random linear network coding to encode a message, a legitimate receiver, which can recover the message if it gathers a sufficient number of linearly independent coded packets, and an
Chatzigeorgiou, Ioannis   +2 more
core   +7 more sources

Information divergence-based low probability of intercept waveform detection for multi-antenna intercept receivers

open access: yesThe Journal of Engineering, 2019
Based on the asymptotic spectral distribution of sample covariance matrix, a new low probability of interception (LPI) signal detection method for multi-antenna intercept receiver is proposed via reforming the noise sequence into a Wishart matrix.
Jun Chen   +3 more
doaj   +2 more sources

On Intercept Probability Minimization under Sparse Random Linear Network Coding [PDF]

open access: yesIEEE Transactions on Vehicular Technology, 2019
This paper considers a network where a node wishes to transmit a source message to a legitimate receiver in the presence of an eavesdropper. The transmitter secures its transmissions employing a sparse implementation of Random Linear Network Coding (RLNC)
Nix, Andrew   +2 more
core   +6 more sources

Relay-Assisted Communications over Multi-Cluster Two-Wave Fading Channels [PDF]

open access: yesSensors
This paper examines the secrecy performance of a decode-and-forward (DF) relay-assisted device-to-device (D2D) communication system operating over Terahertz (THz) channels in multi-cluster two-wave (MTW) fading environments.
Muhammad Junaid Rabbani   +4 more
doaj   +2 more sources

Reliability-Security in Wireless-Powered Cooperative Network with Friendly Jammer

open access: yesAdvances in Electrical and Electronic Engineering, 2022
In this paper, we study the Outage Probability (OP) and the Intercept Probability (IP) of Wireless-Powered Cooperative Networks (WPCNs) in the presence of a malicious eavesdropper and a friendly jammer.
Van Duc Phan   +3 more
doaj   +1 more source

Intercept Probability Analysis of Cooperative Cognitive Networks Using Fountain Codes and Cooperative Jamming [PDF]

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2021
This paper evaluates intercept probability (IP) of a cooperative cognitive radio network. Using Fountain codes, a secondary source continuously generates encoded packets, and sends them to secondary destination and relay nodes that attempt to ...
Tran Duy   +3 more
doaj   +1 more source

On the Security and Reliability Trade-off of the Satellite Terrestrial Networks with Fountain Codes and Friendly Jamming

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2023
The performance of the satellite-terrestrial network with Fountain codes (FCs) is conducted in the present work. More precisely, the air-to-ground link is modeled according to the shadow-Rician distribution to capture the strong light-of-sight (LOS ...
Quang Sang Nguyen   +4 more
doaj   +1 more source

Security and Reliability Trade-off in Device to Device Communications with Untrusted Relays [PDF]

open access: yesAUT Journal of Modeling and Simulation, 2020
In this paper, we investigate the trade-off between reliability and security in a device to device (D2D) network including a pair of D2D, an untrusted relay, and a jammer.
Marzieh Izanlou   +2 more
doaj   +1 more source

On the security and reliability performance of SWIPT-enabled full-duplex relaying in the non-orthogonal multiple access networks

open access: yesJournal of Information and Telecommunication, 2023
The performance of the simultaneous wireless information and power transfer (SWIPT) enabled full-duplex (FD) relaying in non-orthogonal multiple access (NOMA) networks is investigated in both reliability and security aspects.
Quang-Sang Nguyen   +2 more
doaj   +1 more source

On the Intercept Probability and Secure Outage Analysis of Mixed (ακμ)-Shadowed and Málaga Turbulent Models

open access: yesIEEE Access, 2021
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper.
Noor Ahmad Sarker   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy