Results 11 to 20 of about 363,353 (192)
Security Performance Analysis of Cognitive Relay Networks with Energy Collection Function [PDF]
To improve the physical layer security of cognitive relay networks,this paper puts forward a new model based on the combination of energy harvesting technology and artificial noise jamming technology.We first divide the signal transmission process of ...
XU Xinjian, QIU Runhe, JIANG Xueqin
doaj +1 more source
Outage Performance of Cooperative Cognitive Radio Networks under Joint Constraints of Co-Channel Interference, Intercept Probability and Hardware Imperfection [PDF]
This paper evaluates outage probability (OP) of a cooperative underlay cognitive radio network in the presence of a passive secondary eavesdropper under joint impacts of limited interference from a primary network and hardware impairments. With intercept
Pham Thi Dan Ngoc +2 more
doaj +1 more source
Design of Relay Switching to Combat an Eavesdropper in IoT-NOMA Wireless Networks
The requirements of low latency, low cost, less energy consumption, high flexibility, high network capacity, and high data safety are crucial challenges for future Internet of Things (IoT) wireless networks.
Thanh-Nam Tran +4 more
doaj +1 more source
Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments [PDF]
In this paper, we consider harvest-to-jam based secure multi-hop cluster multi-input multi-output networks, where a multi-antenna source sends its data to a multi-antenna destination via multi-antenna intermediate cluster heads.
Ngo Anh +4 more
doaj +1 more source
In this letter, we propose two power allocation strategies, named Optimal Power Allocation (OPA) and Equal Intercept Probability (EIP), for dual-hop cooperative decode-and-forward (DF) relaying networks under constraint of intercept probability (IP ...
Phu Tran Tin, Tran Trung Duy
doaj +1 more source
Quantum Low Probability of Intercept
Conventional cryptography—such as the Rivest–Shamir–Adleman public-key infrastructure—may be rendered insecure by the ever-increasing capabilities of classical computers and the emergence of quantum computers. Quantum key distribution and post-quantum cryptography are presently being pursued as solutions to the quantum threat, but they offer no ...
Jeffrey H. Shapiro +4 more
openaire +1 more source
Low Probability of Intercept Formation Communication Method Based on Chaotic Particle Swam Optimization [PDF]
In order to improve the low interception performance of aircraft formation,a new method of Low Probability of Intercept(LPI) formation communication is proposed.The communication of aircraft formation is considered as an adaptive optimization problem,and
JIANG Bo,DU Xinjun,YANG Yuxiao
doaj +1 more source
Physical layer (PHY) security is recently regarded as a promising technique to improve the security performance of wireless communication networks.
Jia You +3 more
doaj +1 more source
Low-PAPR Waveforms with Shaped Spectrum for Enhanced Low Probability of Intercept Noise Radars
Noise radars employ random waveforms in their transmission as compared to traditional radars. Considered as enhanced Low Probability of Intercept (LPI) radars, they are resilient to interference and jamming and less vulnerable to adversarial exploitation
Kubilay Savci +2 more
doaj +1 more source
To achieve low probability of intercept (LPI) in radar networks for multiple target detection, it is necessary to find the optimal assignment of distributed radars to targets.
Hamid Amiriara +2 more
doaj +1 more source

