Results 11 to 20 of about 133,625 (274)

Secrecy capacity of LiFi systems [PDF]

open access: yesEmerging Imaging and Sensing Technologies for Security and Defence V; and Advanced Manufacturing Technologies for Micro- and Nanosystems in Security and Defence III, 2020
Radio frequency (RF) signals propagate through most materials that we are surrounded by while light is blocked by many of these materials. This feature makes wireless networks based on light (which are also referred to as LiFi networks) inherently more secure.
Abumarshoud, Hanaa   +3 more
openaire   +2 more sources

Secrecy Outage Capacity of Fading Channels [PDF]

open access: yesIEEE Transactions on Information Theory, 2012
submitted to IEEE Transactions on Information ...
Gungor, Onur   +4 more
openaire   +2 more sources

Resource Allocation for Secure MIMO-SWIPT Systems in the Presence of Multi-Antenna Eavesdropper in Vehicular Networks

open access: yesSensors, 2023
In this paper, we optimize the secrecy capacity of the legitimate user under resource allocation and security constraints for a multi-antenna environment for the simultaneous transmission of wireless information and power in a dynamic downlink scenario ...
Vieeralingaam Ganapathy   +2 more
doaj   +1 more source

Secrecy Analysis of Directional mmWave UAV-Based Links Under Hovering Fluctuations

open access: yesIEEE Open Journal of the Communications Society, 2023
Recent developments in Unmanned Aerial Vehicles (UAVs) technology have paved the way to their utilization in different fields and applications. Among these applications, UAVs have been widely investigated as a good candidate to serve as mobile base ...
Saud Althunibat   +3 more
doaj   +1 more source

Physical Layer Security: Channel Sounding Results for the Multi-Antenna Wiretap Channel

open access: yesEntropy, 2023
Many physical-layer security works in the literature rely on purely theoretical work or simulated results to establish the value of physical-layer security in securing communications.
Daniel Harman   +5 more
doaj   +1 more source

Secrecy‐Capacity‐Optimization‐Artificial‐Noise in Large‐Scale MIMO: Ergodic Lower Bound on Secrecy Capacity and Optimal Power Allocation [PDF]

open access: yesWireless Communications and Mobile Computing, 2021
The security of wireless information transmission in large‐scale multi‐input and multioutput (MIMO) is the focus of research in wireless communication. Recently, a new artificial noise—SCO‐AN which shows no orthogonality to the channel, is proposed to overcome the shortcomings of traditional artificial noise.
Yebo Gu, Zhilu Wu, Zhendong Yin
openaire   +1 more source

The Secrecy Capacity Optimization Artificial Noise: A New Type of Artificial Noise for Secure Communication in MIMO System

open access: yesIEEE Access, 2019
In multiple-input multiple-output wireless communication system, artificial noise (AN) is designed to be aligned into the null space of the legitimate channel so that it has no effect on the legitimate channel.
Yebo Gu   +3 more
doaj   +1 more source

On the Binary Input Gaussian Wiretap Channel with/without Output Quantization

open access: yesEntropy, 2017
In this paper, we investigate the effect of output quantization on the secrecy capacity of the binary-input Gaussian wiretap channel. As a result, a closed-form expression with infinite summation terms of the secrecy capacity of the binary-input Gaussian
Chao Qi, Yanling Chen, A. J. Han Vinck
doaj   +1 more source

PHYSICAL LAYER SECRECY ON WIRELESS NETWORK

open access: yesTạp chí Khoa học Đại học Đà Lạt, 2016
In this paper, we present an approach for wireless security based on physical layer. The basic principle of physical layer secrecy (PHY Secrecy) is ensuring secure information transmission in the the system that consists of illegal receiver without using
Trương Tiến Vũ   +3 more
doaj   +1 more source

On Physical Layer Security Over the Fisher-Snedecor ${\mathcal{F}}$ Wiretap Fading Channels

open access: yesIEEE Access, 2018
In this paper, we initially investigate the physical layer security over device-to-device communications, where the channel is modeled from the Fisher-Snedecor .T distribution.
Long Kong, Georges Kaddoum
doaj   +1 more source

Home - About - Disclaimer - Privacy