Results 91 to 100 of about 4,651 (205)

Selection of Jammer and Analysis on Secrecy Outage Probability for WANETs

open access: yesProcedia Computer Science, 2020
Abstract In this paper, we investigate the physical layer security (PLS) in wireless ad hoc networks (WANETs). For fixed transmission distance model, we introduce the jammer selection scheme to enhance the secrecy transmission capacity. The jammer can prevent the eavesdropper from stealing information by sending the interference signal to the ...
Yajing Li   +3 more
openaire   +1 more source

Blockchain in Communication Networks: A Comprehensive Review

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley   +1 more source

The Role of Digital Twin for Space and Remote Terrestrial Construction

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
This article explores digital twin technology's critical role in construction for extreme environments, including space habitats and remote terrestrial infrastructure. It highlights strategic advantages, discusses essential governance and policy frameworks, and identifies emerging technological trends, emphasising the transformative potential for ...
Ehsan Noroozinejad Farsangi
wiley   +1 more source

Physical Layer Security Using Two-Path Successive Relaying

open access: yesSensors, 2016
Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this ...
Qian Yu Liau, Chee Yen Leow, Zhiguo Ding
doaj   +1 more source

The Evaluation Indexes and Defence Methods of Critical Information Nodes in Power Information Physical System Considering False Data Injection Attack Propagation

open access: yesIET Energy Systems Integration, Volume 8, Issue 1, January/December 2026.
ABSTRACT False data injection (FDI) attacks pose a great threat to the safe operation of power grid. By attacking nodes with weak defences, high transmission risks and high returns, attackers can cause more damage to the power grid with limited resources.
Xinrui Liu   +5 more
wiley   +1 more source

On Physical Layer Security Over the Fisher-Snedecor ${\mathcal{F}}$ Wiretap Fading Channels

open access: yesIEEE Access, 2018
In this paper, we initially investigate the physical layer security over device-to-device communications, where the channel is modeled from the Fisher-Snedecor .T distribution.
Long Kong, Georges Kaddoum
doaj   +1 more source

Secure transmission in spectrum sharing MIMO channels with generalized antenna selection over Nakagami-m channels

open access: yesIEEE Access, 2016
We investigate the secrecy outage performance of spectrum sharing multiple-input multiple-output networks using generalized transmit antenna selection with maximal ratio combining over Nakagami-m channels.
Yuzhen Huang   +4 more
doaj   +1 more source

Security–reliability tradeoff analysis of untrusted energy harvesting relay networks

open access: yesInternational Journal of Distributed Sensor Networks, 2018
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen   +4 more
doaj   +1 more source

Physical layer security of NOMA-D2D cooperative wireless system

open access: yesDianxin kexue, 2022
Aiming at the physical layer security (PLS) application requirement of massive user equipments access in the future, the PLS model combining with non-orthogonal multiple access (NOMA), device-to-device (D2D) and relay cooperation was proposed.The model ...
Yifan DING, Guangqiu LI, Hui LI
doaj   +2 more sources

Secure Transmission in mmWave NOMA Networks With Cognitive Power Allocation

open access: yesIEEE Access, 2019
Millimeter wave (mmWave) and non-orthogonal multiple access (NOMA) are two key technologies for future wireless networks. In this paper, secure communication in mmWave NOMA networks based on cognitive power allocation scheme is studied by preferentially ...
Yi Song   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy