On secure system performance over SISO, MISO and MIMO-NOMA wireless networks equipped a multiple antenna based on TAS protocol [PDF]
This study examined how to improve system performance by equipping multiple antennae at a base station (BS) and all terminal users/mobile devices instead of a single antenna as in previous studies.
Tran, Thanh-Nam, Vozňák, Miroslav
core +1 more source
Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection [PDF]
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS ...
Duy, Tran Trung +4 more
core +1 more source
Physical layer security (PLS) can improve the security of both terrestrial and nonterrestrial wireless communication networks. This study proposes a simplified framework for nonterrestrial cyclic prefixed orthogonal variable spreading factor (OVSF ...
Md. Omor Faruk +3 more
doaj +1 more source
Physical Layer Security Design for FDD IM-OTFS Transmissions Based on Secure Mapping
In this paper, a physical layer security scheme is proposed for index modulation aided orthogonal time frequency space (IM-OTFS) modulation systems working in Frequency Division Duplex (FDD) mode.
Kejia Ma +3 more
doaj +1 more source
Analyzing Physical Layer Security of Antenna Subset Modulation as Block Encryption Ciphers
In this paper, a novel framework for analyzing Physical Layer Security (PLS) of Directional Modulation (DM) techniques has been introduced. The proposed framework maps the concepts of PLS techniques to cryptographic techniques, enabling the analysis of ...
Omar Ansari, Muhammad Amin, Abrar Ahmad
doaj +1 more source
Secure Networking with Software-Defined Reconfigurable Intelligent Surfaces
Reconfigurable intelligent surfaces (RIS) are considered of paramount importance to improve air–ground and THz communications performance for 6G systems.
Francesco Chiti +2 more
doaj +1 more source
In this article, several extensions to an alternating space-time (ST) code (STC) physical layer security (PLS) scheme from the literature are proposed.
Michael R. Cribbs +2 more
doaj +1 more source
A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions
With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and ...
Li Sun, Qinghe Du
doaj +1 more source
IRS-Assisted Physical Layer Security for 5G Enabled Industrial Internet of Things
5G is a key enabler of Industrial Internet of Things (IIoT) that provides seamless connectivity between machines, sensors and computing servers. Security and privacy are major concerns for 5G enabled IIoT.
Bakhtiar Ali +5 more
doaj +1 more source
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin +5 more
core +3 more sources

