Results 1 to 10 of about 142,446 (178)

Realistic Secrecy Performance Analysis for LiFi Systems [PDF]

open access: yesIEEE Access, 2021
This paper studies the secrecy performance of light-fidelity (LiFi) networks under the consideration of random device orientation and partial knowledge of the eavesdroppers’ channel state information. Particularly, the secrecy capacity and secrecy
Hanaa Abumarshoud   +3 more
doaj   +6 more sources

Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks [PDF]

open access: yesSensors, 2023
Multihop transmission is one of the important techniques to overcome the transmission coverage of each node in wireless sensor networks (WSNs). However, multihop transmission has a security issue due to the nature of a wireless medium.
Yosefine Triwidyastuti   +3 more
doaj   +2 more sources

Jamming-Aided Secrecy Performance in Secure Uplink NOMA System

open access: yesIEEE Access, 2020
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work.
Kaiwei Jiang, Weihua Zhou, Lingjie Sun
doaj   +3 more sources

On secrecy performance of industrial Internet of things [PDF]

open access: yesInternet Technology Letters, 2018
Physical layer security has been shown to hold promise as a new paradigm for securing wireless links. This paper provides secrecy performance analysis for industrial Internet of things, where a set of industrial devices communicates in the presence of eavesdropper under a Weibull fading environment. We derive a closed‐form expression for secrecy outage
Furqan Jameel   +2 more
exaly   +2 more sources

Secrecy Performance of Cooperative Cognitive Radio Networks Under Joint Secrecy Outage and Primary User Interference Constraints

open access: yesIEEE Access, 2020
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three constraints which include peak transmit power level and ...
Truong Xuan Quach   +3 more
doaj   +3 more sources

SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels

open access: yesIEEE Access, 2018
A new paradigm of uplink non-orthogonal multiple access along with multiple eavesdroppers to achieve secrecy transmission is studied in this paper.
Kaiwei Jiang   +4 more
doaj   +3 more sources

Exploiting Secrecy Performance of Uplink NOMA in Cellular Networks [PDF]

open access: yesIEEE Access, 2021
We study the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with single antenna and multi-antenna users in presence of an eavesdropper. Two phases are required for communications during each time frame between the users and the base
Minh-Sang Van Nguyen   +4 more
doaj   +3 more sources

Secrecy Performance of Correlated $\alpha$ -$\mu$ Fading Channels [PDF]

open access: yesIEEE Communications Letters, 2019
This letter investigates the secrecy performance of the classical Wyner’s wiretap model, where the main channel and eavesdropper channel experience correlated $\alpha $ - $\mu $ fading. Novel and exact expressions for the average secrecy capacity and secrecy outage probability are derived for the considered realistic scenario.
Aashish Mathur   +2 more
exaly   +2 more sources

Relay-Assisted Communications over Multi-Cluster Two-Wave Fading Channels [PDF]

open access: yesSensors
This paper examines the secrecy performance of a decode-and-forward (DF) relay-assisted device-to-device (D2D) communication system operating over Terahertz (THz) channels in multi-cluster two-wave (MTW) fading environments.
Muhammad Junaid Rabbani   +4 more
doaj   +2 more sources

On the Secrecy Performance of Land Mobile Satellite Communication Systems

open access: yesIEEE Access, 2018
In this paper, we investigate the secrecy performance against eavesdropping of a land mobile satellite (LMS) system, where the satellite employs the spot beam technique, and both the terrestrial user and eavesdropper are equipped with multiple antennas and utilize maximal ratio combining to receive the confidential message.
Kang An, Tao Liang, Xiaojuan Yan
exaly   +3 more sources

Home - About - Disclaimer - Privacy