Results 1 to 10 of about 141,592 (289)

Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks [PDF]

open access: yesSensors, 2023
Multihop transmission is one of the important techniques to overcome the transmission coverage of each node in wireless sensor networks (WSNs). However, multihop transmission has a security issue due to the nature of a wireless medium.
Yosefine Triwidyastuti   +3 more
doaj   +2 more sources

Realistic Secrecy Performance Analysis for LiFi Systems [PDF]

open access: yesIEEE Access, 2021
This paper studies the secrecy performance of light-fidelity (LiFi) networks under the consideration of random device orientation and partial knowledge of the eavesdroppers’ channel state information. Particularly, the secrecy capacity and secrecy
Hanaa Abumarshoud   +3 more
doaj   +4 more sources

Secrecy Performance of Cooperative Cognitive Radio Networks Under Joint Secrecy Outage and Primary User Interference Constraints [PDF]

open access: yesIEEE Access, 2020
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three constraints which include peak transmit power level and ...
Truong Xuan Quach   +3 more
doaj   +2 more sources

Jamming-Aided Secrecy Performance in Secure Uplink NOMA System

open access: yesIEEE Access, 2020
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work.
Kaiwei Jiang, Weihua Zhou, Lingjie Sun
doaj   +1 more source

Secrecy outage probability of a NOMA scheme and impact imperfect channel state information in underlay cooperative cognitive networks [PDF]

open access: yes, 2020
Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper.
Fazio, Peppino   +4 more
core   +1 more source

Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages

open access: yesEntropy, 2019
Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link ...
Yi Song   +4 more
doaj   +1 more source

Secrecy Performance of SIMO Underlay Cognitive Radio Networks Over α – μ Fading Channels

open access: yesIEEE Access, 2021
This paper investigates the secrecy performance of a single-input multiple-output (SIMO) based underlay cognitive radio networks. In particular, a single-antenna secondary transmitter transmits its secret message to a multi-antenna equipped secondary ...
Suneel Yadav, Devendra Singh Gurjar
doaj   +1 more source

Secure Communications in Millimeter Wave Ad Hoc Networks [PDF]

open access: yes, 2017
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential ...
Heath Jr, Robert W.   +3 more
core   +2 more sources

Comprehensive Physical Layer Security Analysis of FSO Communications Over Málaga Channels

open access: yesIEEE Photonics Journal, 2020
In this article, we study the physical layer security of free-space optical (FSO) communications under different eavesdropping scenarios. More specifically, the secrecy performance of FSO communication employing intensity modulation/direct detection ...
Yun Ai   +4 more
doaj   +1 more source

On the secrecy performance of RIS-enabled wireless communications over Nakagami-m fading channels

open access: yesICT Express, 2023
This paper examines the secrecy performance of reconfigurable intelligent surface aided wireless communication systems. Specifically, we derive the secrecy outage probability (SOP), intercept probability, probability of non-zero secrecy capacity, and ...
Ashutosh K. Yadav   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy