Transmitting Status Updates on Infinite Capacity Systems with Eavesdropper: Freshness Advantage of Legitimate Receiver. [PDF]
Zhang J +5 more
europepmc +1 more source
Secure and energy-efficient transmission in UAV-assisted intelligent reflecting surface networks. [PDF]
Xue J, Xu J, Guan X, Zhang H, Gan Y.
europepmc +1 more source
Performance analysis of dual-hop mixed RF-FSO systems combined with NOMA. [PDF]
Hung TC +6 more
europepmc +1 more source
Resource allocation of cognitive relay networks under continuous transmission mechanism. [PDF]
Qin D.
europepmc +1 more source
Channel modeling and capacity optimization for optical RIS aided NOMA in indoor multiuser visible light communication IoT systems. [PDF]
El Jbari M +3 more
europepmc +1 more source
Related searches:
Secrecy Outage Probability in Backscatter Communication Systems With Tag Selection
IEEE Wireless Communications Letters, 2021In this letter, we propose a tag selection scheme to enhance the security transmission in a passive backscatter communication system with multiple tags and one eavesdropper, and analyze the secrecy outage probability (SOP). In particular, considering a practical non-linear energy harvesting model, we first determine the optimal dynamic reflection ...
Yingting Liu +2 more
openaire +1 more source
Improving Secrecy Outage Probability with Symbol Extension
2014 IEEE 79th Vehicular Technology Conference (VTC Spring), 2014This paper reveals symbol extension is capable of improving secrecy performance in the multiple-input single-output (MISO) wiretap channel. We propose a symbol extension scheme jointly with the existing beamforming and artificial noise generation strategy to exploit the time variation of fading channel.
Cong Zhang 0003 +3 more
openaire +1 more source
Secrecy outage probability of wirelessly powered wiretap channels
2016 24th European Signal Processing Conference (EUSIPCO), 2016This paper considers a wirelessly powered wiretap channel, where an energy constrained information source, powered by a dedicated power beacon, communicates with a legitimate user in the presence of a passive eavesdropper. The source is assumed to have multiple antennas, while the other three nodes are equipped with a single antenna each. Considering a
Xin Jiang 0009 +3 more
openaire +1 more source
Secrecy Outage Probability in Multi-RAT Heterogeneous Networks
IEEE Communications Letters, 2016Practical difficulty in examining all base stations (BSs) to choose the best one providing secure transmission in heterogeneous networks (HetNets), we impose a BS association constraint in this letter that the BSs providing an average received signal power at the legitimate user greater than a predetermined receiving threshold can be candidate serving ...
Huici Wu +3 more
openaire +1 more source
AbstractIn this paper, we study the multiple‐input multiple‐output multiple‐eavesdropper wiretap channel in the nonergodic and ergodic scenarios, both with stationary Rayleigh distributed fading channels. For the ergodic scenario, we derive a new closed‐form expression for the ergodic secrecy capacity with full channel state information at the ...
Andre Saito Guerreiro +2 more
openaire +1 more source

