Results 91 to 100 of about 4,724 (196)

Secure transmission in spectrum sharing MIMO channels with generalized antenna selection over Nakagami-m channels

open access: yesIEEE Access, 2016
We investigate the secrecy outage performance of spectrum sharing multiple-input multiple-output networks using generalized transmit antenna selection with maximal ratio combining over Nakagami-m channels.
Yuzhen Huang   +4 more
doaj   +1 more source

Security–reliability tradeoff analysis of untrusted energy harvesting relay networks

open access: yesInternational Journal of Distributed Sensor Networks, 2018
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen   +4 more
doaj   +1 more source

Physical layer security of NOMA-D2D cooperative wireless system

open access: yesDianxin kexue, 2022
Aiming at the physical layer security (PLS) application requirement of massive user equipments access in the future, the PLS model combining with non-orthogonal multiple access (NOMA), device-to-device (D2D) and relay cooperation was proposed.The model ...
Yifan DING, Guangqiu LI, Hui LI
doaj   +2 more sources

Secure Transmission in mmWave NOMA Networks With Cognitive Power Allocation

open access: yesIEEE Access, 2019
Millimeter wave (mmWave) and non-orthogonal multiple access (NOMA) are two key technologies for future wireless networks. In this paper, secure communication in mmWave NOMA networks based on cognitive power allocation scheme is studied by preferentially ...
Yi Song   +4 more
doaj   +1 more source

Outage probability of selective decode and forward relaying with secrecy constraints

open access: yesCoRR, 2011
We study the outage probability of opportunistic relay selection in decode-and-forward relaying with secrecy constraints. We derive the closed-form expression for the outage probability. Based on the analytical result, the asymptotic performance is then investigated. The accuracy of our performance analysis is verified by the simulation results.
Xiaojun Sun, Chunming Zhao
openaire   +2 more sources

Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks

open access: yesSensors, 2018
In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed.
Xuanxuan Tang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy