Results 91 to 100 of about 4,651 (205)
Selection of Jammer and Analysis on Secrecy Outage Probability for WANETs
Abstract In this paper, we investigate the physical layer security (PLS) in wireless ad hoc networks (WANETs). For fixed transmission distance model, we introduce the jammer selection scheme to enhance the secrecy transmission capacity. The jammer can prevent the eavesdropper from stealing information by sending the interference signal to the ...
Yajing Li +3 more
openaire +1 more source
Blockchain in Communication Networks: A Comprehensive Review
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley +1 more source
The Role of Digital Twin for Space and Remote Terrestrial Construction
This article explores digital twin technology's critical role in construction for extreme environments, including space habitats and remote terrestrial infrastructure. It highlights strategic advantages, discusses essential governance and policy frameworks, and identifies emerging technological trends, emphasising the transformative potential for ...
Ehsan Noroozinejad Farsangi
wiley +1 more source
Physical Layer Security Using Two-Path Successive Relaying
Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this ...
Qian Yu Liau, Chee Yen Leow, Zhiguo Ding
doaj +1 more source
ABSTRACT False data injection (FDI) attacks pose a great threat to the safe operation of power grid. By attacking nodes with weak defences, high transmission risks and high returns, attackers can cause more damage to the power grid with limited resources.
Xinrui Liu +5 more
wiley +1 more source
On Physical Layer Security Over the Fisher-Snedecor
In this paper, we initially investigate the physical layer security over device-to-device communications, where the channel is modeled from the Fisher-Snedecor .T distribution.
Long Kong, Georges Kaddoum
doaj +1 more source
We investigate the secrecy outage performance of spectrum sharing multiple-input multiple-output networks using generalized transmit antenna selection with maximal ratio combining over Nakagami-m channels.
Yuzhen Huang +4 more
doaj +1 more source
Security–reliability tradeoff analysis of untrusted energy harvesting relay networks
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen +4 more
doaj +1 more source
Physical layer security of NOMA-D2D cooperative wireless system
Aiming at the physical layer security (PLS) application requirement of massive user equipments access in the future, the PLS model combining with non-orthogonal multiple access (NOMA), device-to-device (D2D) and relay cooperation was proposed.The model ...
Yifan DING, Guangqiu LI, Hui LI
doaj +2 more sources
Secure Transmission in mmWave NOMA Networks With Cognitive Power Allocation
Millimeter wave (mmWave) and non-orthogonal multiple access (NOMA) are two key technologies for future wireless networks. In this paper, secure communication in mmWave NOMA networks based on cognitive power allocation scheme is studied by preferentially ...
Yi Song +4 more
doaj +1 more source

