Secrecy Outage Probability of SWIPT-OFDMA Schemes with Transmit Antenna Selection
This study examines the wireless communications secrecy performance of multi-user (MU) simultaneous wireless information and power transfer (SWIPT) scheme employing transmit antenna selection (TAS) and maximal-ratio combining (MRC). In order to address the user scheduling requirement of MU-SWIPT scheme, orthogonal frequency-division multiple access ...
Coskun, Ahmet Faruk +2 more
openaire +3 more sources
Secrecy analysis of AF relaying with triple selection over arbitrary Nakagami fading channels
This paper analyzes the secrecy outage probability of amplify and forward (AF) relaying with triple selection over real valued Nakagami fading channels.
Donghun Lee
doaj +1 more source
In this paper, we study the physical layer security for simultaneous wireless information and power transfer (SWIPT)-based half-duplex (HD) decode-and-forward relaying system.
Van-Duc Phan +3 more
doaj +1 more source
Secrecy outage probability of inter‐vehicular cognitive radio networks
SummaryHerein, we consider an underlay cognitive radio network (CRN) where mobile secondary user wishes to transmit a confidential information to the secondary destination in the presence of an illegitimate eavesdropper which is trying to steal the classified message signal.
Serdar Özgür Ata, Eylem Erdogan
openaire +2 more sources
Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint
This paper studies the physical layer security issue for cognitive radio sensor networks (CRSNs) with primary outage constraint, for which a tractable framework is developed to analyze the secrecy performance for CRSNs related to the random channel ...
Hongyu Ma +4 more
doaj +1 more source
Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks [PDF]
We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks, where multiple noncolluding eavesdroppers attempt to intercept the secondary transmission.
Deng, Y +4 more
core +2 more sources
Enhancing wireless security via optimal cooperative jamming [PDF]
In this work, we analyze the secrecy rate in a cooperative network, where a source node is assisted by relay nodes via cooperative jamming for delivering a secret message to the destination in the presence of an eavesdropper node.
Gurbuz, Ozgur +3 more
core +1 more source
Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model [PDF]
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and ...
Duong, TQ +4 more
core +2 more sources
Selection of Jammer and Analysis on Secrecy Outage Probability for WANETs
Abstract In this paper, we investigate the physical layer security (PLS) in wireless ad hoc networks (WANETs). For fixed transmission distance model, we introduce the jammer selection scheme to enhance the secrecy transmission capacity. The jammer can prevent the eavesdropper from stealing information by sending the interference signal to the ...
Yajing Li +3 more
openaire +1 more source
Secure performance analysis of relay systems with multi-relay and multi-user selection
The exact expressions for the non-zero secrecy capacity probability,secrecy outage probability of AF relay systems with transmit antenna selection and receive maximal ratio combining and its asymptotic secrecy outage probability at high signal to noise ...
Tingjie REN, Guangqiu LI, Ying CHENG
doaj +2 more sources

