Results 21 to 30 of about 11,528 (153)

On secure system performance over SISO, MISO and MIMO-NOMA wireless networks equipped a multiple antenna based on TAS protocol [PDF]

open access: yes, 2020
This study examined how to improve system performance by equipping multiple antennae at a base station (BS) and all terminal users/mobile devices instead of a single antenna as in previous studies.
Tran, Thanh-Nam, Vozňák, Miroslav
core   +1 more source

Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection [PDF]

open access: yes, 2019
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS ...
Duy, Tran Trung   +4 more
core   +1 more source

Orthogonal variable spreading factor encoded unmanned aerial vehicle-assisted nonorthogonal multiple access system with hybrid physical layer security

open access: yesETRI Journal, 2023
Physical layer security (PLS) can improve the security of both terrestrial and nonterrestrial wireless communication networks. This study proposes a simplified framework for nonterrestrial cyclic prefixed orthogonal variable spreading factor (OVSF ...
Md. Omor Faruk   +3 more
doaj   +1 more source

Physical Layer Security Design for FDD IM-OTFS Transmissions Based on Secure Mapping

open access: yesIEEE Access, 2023
In this paper, a physical layer security scheme is proposed for index modulation aided orthogonal time frequency space (IM-OTFS) modulation systems working in Frequency Division Duplex (FDD) mode.
Kejia Ma   +3 more
doaj   +1 more source

Analyzing Physical Layer Security of Antenna Subset Modulation as Block Encryption Ciphers

open access: yesIEEE Access, 2019
In this paper, a novel framework for analyzing Physical Layer Security (PLS) of Directional Modulation (DM) techniques has been introduced. The proposed framework maps the concepts of PLS techniques to cryptographic techniques, enabling the analysis of ...
Omar Ansari, Muhammad Amin, Abrar Ahmad
doaj   +1 more source

Secure Networking with Software-Defined Reconfigurable Intelligent Surfaces

open access: yesSensors, 2023
Reconfigurable intelligent surfaces (RIS) are considered of paramount importance to improve air–ground and THz communications performance for 6G systems.
Francesco Chiti   +2 more
doaj   +1 more source

Alternative Codes and Phase Rotation Extensions for Alternating Space-Time Coding-Based Physical Layer Security

open access: yesIEEE Open Journal of the Communications Society, 2021
In this article, several extensions to an alternating space-time (ST) code (STC) physical layer security (PLS) scheme from the literature are proposed.
Michael R. Cribbs   +2 more
doaj   +1 more source

A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions

open access: yesEntropy, 2018
With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and ...
Li Sun, Qinghe Du
doaj   +1 more source

IRS-Assisted Physical Layer Security for 5G Enabled Industrial Internet of Things

open access: yesIEEE Access, 2023
5G is a key enabler of Industrial Internet of Things (IIoT) that provides seamless connectivity between machines, sensors and computing servers. Security and privacy are major concerns for 5G enabled IIoT.
Bakhtiar Ali   +5 more
doaj   +1 more source

Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]

open access: yes, 2017
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin   +5 more
core   +3 more sources

Home - About - Disclaimer - Privacy