Results 31 to 40 of about 4,651 (205)

Secrecy Performance of Cooperative Cognitive Radio Networks Under Joint Secrecy Outage and Primary User Interference Constraints

open access: yesIEEE Access, 2020
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three constraints which include peak transmit power level and ...
Truong Xuan Quach   +3 more
doaj   +1 more source

Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks [PDF]

open access: yes, 2016
We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks, where multiple noncolluding eavesdroppers attempt to intercept the secondary transmission.
Deng, Y   +4 more
core   +2 more sources

Joint 3D Beamforming and Trajectory Design for UAV-Enabled Mobile Relaying System

open access: yesIEEE Access, 2019
The goal of this paper is to investigate the security performance of the multi-antenna unmanned aerial vehicle (UAV)-enabled mobile relaying system with a multi-antenna destination in the presence of a multi-antenna eavesdropper.
Quansheng Yuan   +3 more
doaj   +1 more source

Physical-Layer Security Enhancement via Relay-Aided D2D Communications Underlaying Cellular Networks

open access: yesIEEE Open Journal of the Communications Society, 2020
In this paper, we propose a relay-assisted device-to-device (D2D) communication as an underlay in a cellular network, where two sequential best relay nodes based on different selection criteria are chosen.
Jules M. Moualeu, Telex M. N. Ngatched
doaj   +1 more source

Performance Analysis and Experimental Investigation of Physical-Layer Security in OCDMA-Based Hybrid FSO/Fiber Wiretap Channel

open access: yesIEEE Photonics Journal, 2019
In this paper, optical code division multiple access (OCDMA) based hybrid free-space optical (FSO)/fiber wiretap channel is proposed, and the physical-layer security is analyzed theoretically, using the conditional secrecy outage probability as ...
Jianhua Ji   +3 more
doaj   +1 more source

On the Physical Layer Security Peculiarities of Wireless Communications in the Presence of the Beaulieu-Xie Shadowed Fading

open access: yesMathematics, 2022
The article presents an analysis of the physical layer security of a wireless communication system functioning in the presence of multipath fading and a wiretap.
Aleksey S. Gvozdarev   +1 more
doaj   +1 more source

Optimal Power Allocation for A Massive MIMO Relay Aided Secure Communication

open access: yes, 2015
In this paper, we address the problem of optimal power allocation at the relay in two-hop secure communications under practical conditions. To guarantee secure communication during the long-distance transmission, the massive MIMO (M-MIMO) relaying ...
Chen, Jian   +2 more
core   +1 more source

Secrecy Outage Probability of Network-Coded Cooperative Communication

open access: yes, 2014
We evaluate the secrecy performance of a multiple access cooperative network where the destination node is wiretapped by a malicious and passive eavesdropper. We propose the application of the network coding technique as an alternative to increase the secrecy at the destination node, on the top of improving the error performance of the legitimate ...
Rebelatto, João Luiz   +4 more
openaire   +2 more sources

Cooperative Transmission for Security Enhancement in Clustered Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
We study opportunistic decode-and-forward relaying transmission in cooperative cluster-based wireless sensor networks (WSNs) with secrecy constraints, where a passive eavesdropper may overhear the source message.
Weiwei Yang, Songqing Wang, Xiaoming Xu
doaj   +1 more source

Secrecy outage of threshold-based cooperative relay network with and without direct links

open access: yesEURASIP Journal on Information Security, 2018
In this paper, we investigate the secrecy outage performance of a dual-hop decode-and-forward (DF) threshold-based cooperative relay network, both with and without the direct links between source-eavesdropper and source-destination. Without assuming that
Khyati Chopra, Ranjan Bose, Anupam Joshi
doaj   +1 more source

Home - About - Disclaimer - Privacy