Results 31 to 40 of about 4,651 (205)
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three constraints which include peak transmit power level and ...
Truong Xuan Quach +3 more
doaj +1 more source
Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks [PDF]
We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks, where multiple noncolluding eavesdroppers attempt to intercept the secondary transmission.
Deng, Y +4 more
core +2 more sources
Joint 3D Beamforming and Trajectory Design for UAV-Enabled Mobile Relaying System
The goal of this paper is to investigate the security performance of the multi-antenna unmanned aerial vehicle (UAV)-enabled mobile relaying system with a multi-antenna destination in the presence of a multi-antenna eavesdropper.
Quansheng Yuan +3 more
doaj +1 more source
Physical-Layer Security Enhancement via Relay-Aided D2D Communications Underlaying Cellular Networks
In this paper, we propose a relay-assisted device-to-device (D2D) communication as an underlay in a cellular network, where two sequential best relay nodes based on different selection criteria are chosen.
Jules M. Moualeu, Telex M. N. Ngatched
doaj +1 more source
In this paper, optical code division multiple access (OCDMA) based hybrid free-space optical (FSO)/fiber wiretap channel is proposed, and the physical-layer security is analyzed theoretically, using the conditional secrecy outage probability as ...
Jianhua Ji +3 more
doaj +1 more source
The article presents an analysis of the physical layer security of a wireless communication system functioning in the presence of multipath fading and a wiretap.
Aleksey S. Gvozdarev +1 more
doaj +1 more source
Optimal Power Allocation for A Massive MIMO Relay Aided Secure Communication
In this paper, we address the problem of optimal power allocation at the relay in two-hop secure communications under practical conditions. To guarantee secure communication during the long-distance transmission, the massive MIMO (M-MIMO) relaying ...
Chen, Jian +2 more
core +1 more source
Secrecy Outage Probability of Network-Coded Cooperative Communication
We evaluate the secrecy performance of a multiple access cooperative network where the destination node is wiretapped by a malicious and passive eavesdropper. We propose the application of the network coding technique as an alternative to increase the secrecy at the destination node, on the top of improving the error performance of the legitimate ...
Rebelatto, João Luiz +4 more
openaire +2 more sources
Cooperative Transmission for Security Enhancement in Clustered Wireless Sensor Networks
We study opportunistic decode-and-forward relaying transmission in cooperative cluster-based wireless sensor networks (WSNs) with secrecy constraints, where a passive eavesdropper may overhear the source message.
Weiwei Yang, Songqing Wang, Xiaoming Xu
doaj +1 more source
Secrecy outage of threshold-based cooperative relay network with and without direct links
In this paper, we investigate the secrecy outage performance of a dual-hop decode-and-forward (DF) threshold-based cooperative relay network, both with and without the direct links between source-eavesdropper and source-destination. Without assuming that
Khyati Chopra, Ranjan Bose, Anupam Joshi
doaj +1 more source

