Results 11 to 20 of about 363,353 (192)

Security Performance Analysis of Cognitive Relay Networks with Energy Collection Function [PDF]

open access: yesJisuanji gongcheng, 2019
To improve the physical layer security of cognitive relay networks,this paper puts forward a new model based on the combination of energy harvesting technology and artificial noise jamming technology.We first divide the signal transmission process of ...
XU Xinjian, QIU Runhe, JIANG Xueqin
doaj   +1 more source

Outage Performance of Cooperative Cognitive Radio Networks under Joint Constraints of Co-Channel Interference, Intercept Probability and Hardware Imperfection [PDF]

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2019
This paper evaluates outage probability (OP) of a cooperative underlay cognitive radio network in the presence of a passive secondary eavesdropper under joint impacts of limited interference from a primary network and hardware impairments. With intercept
Pham Thi Dan Ngoc   +2 more
doaj   +1 more source

Design of Relay Switching to Combat an Eavesdropper in IoT-NOMA Wireless Networks

open access: yesFuture Internet, 2022
The requirements of low latency, low cost, less energy consumption, high flexibility, high network capacity, and high data safety are crucial challenges for future Internet of Things (IoT) wireless networks.
Thanh-Nam Tran   +4 more
doaj   +1 more source

Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments [PDF]

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2021
In this paper, we consider harvest-to-jam based secure multi-hop cluster multi-input multi-output networks, where a multi-antenna source sends its data to a multi-antenna destination via multi-antenna intermediate cluster heads.
Ngo Anh   +4 more
doaj   +1 more source

Power allocation strategies for dual-hop relay protocols with best relay selection under constraint of intercept probability

open access: yesICT Express, 2019
In this letter, we propose two power allocation strategies, named Optimal Power Allocation (OPA) and Equal Intercept Probability (EIP), for dual-hop cooperative decode-and-forward (DF) relaying networks under constraint of intercept probability (IP ...
Phu Tran Tin, Tran Trung Duy
doaj   +1 more source

Quantum Low Probability of Intercept

open access: yesConference on Lasers and Electro-Optics, 2019
Conventional cryptography—such as the Rivest–Shamir–Adleman public-key infrastructure—may be rendered insecure by the ever-increasing capabilities of classical computers and the emergence of quantum computers. Quantum key distribution and post-quantum cryptography are presently being pursued as solutions to the quantum threat, but they offer no ...
Jeffrey H. Shapiro   +4 more
openaire   +1 more source

Low Probability of Intercept Formation Communication Method Based on Chaotic Particle Swam Optimization [PDF]

open access: yesJisuanji gongcheng, 2017
In order to improve the low interception performance of aircraft formation,a new method of Low Probability of Intercept(LPI) formation communication is proposed.The communication of aircraft formation is considered as an adaptive optimization problem,and
JIANG Bo,DU Xinjun,YANG Yuxiao
doaj   +1 more source

Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors

open access: yesIEEE Access, 2014
Physical layer (PHY) security is recently regarded as a promising technique to improve the security performance of wireless communication networks.
Jia You   +3 more
doaj   +1 more source

Low-PAPR Waveforms with Shaped Spectrum for Enhanced Low Probability of Intercept Noise Radars

open access: yesRemote Sensing, 2021
Noise radars employ random waveforms in their transmission as compared to traditional radars. Considered as enhanced Low Probability of Intercept (LPI) radars, they are resilient to interference and jamming and less vulnerable to adversarial exploitation
Kubilay Savci   +2 more
doaj   +1 more source

Efficient Radar-Target Assignment in Low Probability of Intercept Radar Networks: A Machine-Learning Approach

open access: yesIEEE Open Journal of the Communications Society, 2023
To achieve low probability of intercept (LPI) in radar networks for multiple target detection, it is necessary to find the optimal assignment of distributed radars to targets.
Hamid Amiriara   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy