Results 1 to 10 of about 363,333 (172)
Rethinking the Intercept Probability of Random Linear Network Coding [PDF]
This letter considers a network comprising a transmitter, which employs random linear network coding to encode a message, a legitimate receiver, which can recover the message if it gathers a sufficient number of linearly independent coded packets, and an
Chatzigeorgiou, Ioannis +2 more
core +7 more sources
Based on the asymptotic spectral distribution of sample covariance matrix, a new low probability of interception (LPI) signal detection method for multi-antenna intercept receiver is proposed via reforming the noise sequence into a Wishart matrix.
Jun Chen +3 more
doaj +2 more sources
On Intercept Probability Minimization under Sparse Random Linear Network Coding [PDF]
This paper considers a network where a node wishes to transmit a source message to a legitimate receiver in the presence of an eavesdropper. The transmitter secures its transmissions employing a sparse implementation of Random Linear Network Coding (RLNC)
Nix, Andrew +2 more
core +6 more sources
Relay-Assisted Communications over Multi-Cluster Two-Wave Fading Channels [PDF]
This paper examines the secrecy performance of a decode-and-forward (DF) relay-assisted device-to-device (D2D) communication system operating over Terahertz (THz) channels in multi-cluster two-wave (MTW) fading environments.
Muhammad Junaid Rabbani +4 more
doaj +2 more sources
Reliability-Security in Wireless-Powered Cooperative Network with Friendly Jammer
In this paper, we study the Outage Probability (OP) and the Intercept Probability (IP) of Wireless-Powered Cooperative Networks (WPCNs) in the presence of a malicious eavesdropper and a friendly jammer.
Van Duc Phan +3 more
doaj +1 more source
Intercept Probability Analysis of Cooperative Cognitive Networks Using Fountain Codes and Cooperative Jamming [PDF]
This paper evaluates intercept probability (IP) of a cooperative cognitive radio network. Using Fountain codes, a secondary source continuously generates encoded packets, and sends them to secondary destination and relay nodes that attempt to ...
Tran Duy +3 more
doaj +1 more source
The performance of the satellite-terrestrial network with Fountain codes (FCs) is conducted in the present work. More precisely, the air-to-ground link is modeled according to the shadow-Rician distribution to capture the strong light-of-sight (LOS ...
Quang Sang Nguyen +4 more
doaj +1 more source
Security and Reliability Trade-off in Device to Device Communications with Untrusted Relays [PDF]
In this paper, we investigate the trade-off between reliability and security in a device to device (D2D) network including a pair of D2D, an untrusted relay, and a jammer.
Marzieh Izanlou +2 more
doaj +1 more source
The performance of the simultaneous wireless information and power transfer (SWIPT) enabled full-duplex (FD) relaying in non-orthogonal multiple access (NOMA) networks is investigated in both reliability and security aspects.
Quang-Sang Nguyen +2 more
doaj +1 more source
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper.
Noor Ahmad Sarker +6 more
doaj +1 more source

