Results 21 to 30 of about 4,651 (205)
Rate Splitting in the Presence of Untrusted Users: Outage and Secrecy Outage Performances
In this contribution, a thorough investigation of the performance of rate splitting is conducted in terms of outage and secrecy outage for the simultaneous service to a near user and far user, where the latter attempts to overhear the message of the ...
Milad Abolpour +3 more
doaj +1 more source
This paper investigates the impact of a dual‐signal selection (i.e. selection of direct signal and relay signal) and multiple eavesdroppers on secrecy outage probability in cooperative‐relay systems over Nakagami fading channels.
Donghun Lee
doaj +1 more source
In this paper, we investigate secure communication in a hybrid relay (HR)-assisted wireless powered cooperative communication network (WPCCN), where an eavesdropper tries to intercept the data transmitted by a source user and the HR simultaneously.
Xiaohui Shang +4 more
doaj +1 more source
In this paper, we study the physical layer security for simultaneous wireless information and power transfer (SWIPT)-based half-duplex (HD) decode-and-forward relaying system.
Van-Duc Phan +3 more
doaj +1 more source
Enhancing wireless security via optimal cooperative jamming [PDF]
In this work, we analyze the secrecy rate in a cooperative network, where a source node is assisted by relay nodes via cooperative jamming for delivering a secret message to the destination in the presence of an eavesdropper node.
Gurbuz, Ozgur +3 more
core +1 more source
Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint
This paper studies the physical layer security issue for cognitive radio sensor networks (CRSNs) with primary outage constraint, for which a tractable framework is developed to analyze the secrecy performance for CRSNs related to the random channel ...
Hongyu Ma +4 more
doaj +1 more source
Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection [PDF]
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS ...
Duy, Tran Trung +4 more
core +1 more source
Cyber-Physical-Systems and Secrecy Outage Probability: Revisited
This paper technically explores the secrecy rate $Λ$ and a maximisation problem over the concave version of the secrecy outage probability (SOP) as $\mathop{{\rm \mathbb{M}ax}}\limits_{Δ} {\rm \; } \mathbb{P}\mathscr{r} \big( Λ\ge λ\big) $. We do this from a generic viewpoint even though we use a traditional Wyner's wiretap channel for our system model
openaire +2 more sources
Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model [PDF]
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and ...
Duong, TQ +4 more
core +2 more sources
Secure performance analysis of relay systems with multi-relay and multi-user selection
The exact expressions for the non-zero secrecy capacity probability,secrecy outage probability of AF relay systems with transmit antenna selection and receive maximal ratio combining and its asymptotic secrecy outage probability at high signal to noise ...
Tingjie REN, Guangqiu LI, Ying CHENG
doaj +2 more sources

