Results 41 to 50 of about 4,724 (196)

Jamming-Aided Secure Communication in Massive MIMO Rician Channels

open access: yes, 2015
In this paper, we investigate the artificial noise-aided jamming design for a transmitter equipped with large antenna array in Rician fading channels. We figure out that when the number of transmit antennas tends to infinity, whether the secrecy outage ...
Lee, Jemin   +3 more
core   +1 more source

On the Analysis of Secrecy Outage Probability Using Average Channel Capacity

open access: yesSakarya University Journal of Science, 2020
In this article, we analyze the outage probability of physically secure wireless signal transmission in fading envi-ronments where both primary and eavesdropper channels are subject to generalized fading. We propose a novel approach using the average channel capacity of the primary channel and that of the eavesdropper channel to the outage probability ...
openaire   +5 more sources

Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks

open access: yesTongxin xuebao, 2016
A secure access strategy for D2D (device-to-device) communications underlaying cellular networks based on the secrecy outage probability was proposed.Firstly,the secrecy outage probability in the worst case was derived and a transmission power ...
Ya-jun CHEN   +3 more
doaj   +2 more sources

Secrecy outage probability analysis of energy‐aware relay selection for energy‐harvesting cooperative systems

open access: yesIET Communications, 2022
The secrecy outage performance for a cooperative cognitive radio energy‐harvesting network is analyzed. The cognitive network is composed of an energy‐constrained cognitive source (CS), multiple energy‐constrained cognitive relays (CRs) and a cognitive ...
Yujie Zhang   +3 more
doaj   +1 more source

Outage Constrained Robust Secure Transmission for MISO Wiretap Channels [PDF]

open access: yes, 2013
In this paper we consider the robust secure beamformer design for MISO wiretap channels. Assume that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and secrecy ...
Hong, Mingyi   +4 more
core  

Location-Based Beamforming for Rician Wiretap Channels

open access: yes, 2015
We propose a location-based beamforming scheme for wiretap channels, where a source communicates with a legitimate receiver in the presence of an eavesdropper.
Liu, Chenxi, Malaney, Robert
core   +1 more source

Decentralized Federated Learning for Wind Turbine Bearing Prognostics Under Data Scarcity and Statistical Heterogeneity

open access: yesEnergy Science &Engineering, EarlyView.
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom   +2 more
wiley   +1 more source

Secrecy Outage Performance Analysis for Cooperative NOMA Over Nakagami- $m$ Channel

open access: yesIEEE Access, 2019
In this paper, we investigate the secrecy outage performance of a typical cooperative downlink non-orthogonal multiple access (NOMA) system over Nakagami-m fading channel, in which the base station transmits a superimposed signal to two users via a relay.
Chao Yu, Hak-Lim Ko, Xin Peng, Wenwu Xie
doaj   +1 more source

On the secrecy performance of RIS-enabled wireless communications over Nakagami-m fading channels

open access: yesICT Express, 2023
This paper examines the secrecy performance of reconfigurable intelligent surface aided wireless communication systems. Specifically, we derive the secrecy outage probability (SOP), intercept probability, probability of non-zero secrecy capacity, and ...
Ashutosh K. Yadav   +3 more
doaj   +1 more source

Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays

open access: yes, 2015
We enhance the physical-layer security (PLS) of amplify-and-forward relaying networks with the aid of joint relay and jammer selection (JRJS), despite the deliterious effect of channel state information (CSI) feedback delays.
Cai, Yueming   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy