Results 1 to 10 of about 142,446 (178)
Realistic Secrecy Performance Analysis for LiFi Systems [PDF]
This paper studies the secrecy performance of light-fidelity (LiFi) networks under the consideration of random device orientation and partial knowledge of the eavesdroppers’ channel state information. Particularly, the secrecy capacity and secrecy
Hanaa Abumarshoud +3 more
doaj +6 more sources
Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks [PDF]
Multihop transmission is one of the important techniques to overcome the transmission coverage of each node in wireless sensor networks (WSNs). However, multihop transmission has a security issue due to the nature of a wireless medium.
Yosefine Triwidyastuti +3 more
doaj +2 more sources
Jamming-Aided Secrecy Performance in Secure Uplink NOMA System
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work.
Kaiwei Jiang, Weihua Zhou, Lingjie Sun
doaj +3 more sources
On secrecy performance of industrial Internet of things [PDF]
Physical layer security has been shown to hold promise as a new paradigm for securing wireless links. This paper provides secrecy performance analysis for industrial Internet of things, where a set of industrial devices communicates in the presence of eavesdropper under a Weibull fading environment. We derive a closed‐form expression for secrecy outage
Furqan Jameel +2 more
exaly +2 more sources
In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three constraints which include peak transmit power level and ...
Truong Xuan Quach +3 more
doaj +3 more sources
SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels
A new paradigm of uplink non-orthogonal multiple access along with multiple eavesdroppers to achieve secrecy transmission is studied in this paper.
Kaiwei Jiang +4 more
doaj +3 more sources
Exploiting Secrecy Performance of Uplink NOMA in Cellular Networks [PDF]
We study the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with single antenna and multi-antenna users in presence of an eavesdropper. Two phases are required for communications during each time frame between the users and the base
Minh-Sang Van Nguyen +4 more
doaj +3 more sources
Secrecy Performance of Correlated $\alpha$ -$\mu$ Fading Channels [PDF]
This letter investigates the secrecy performance of the classical Wyner’s wiretap model, where the main channel and eavesdropper channel experience correlated $\alpha $ - $\mu $ fading. Novel and exact expressions for the average secrecy capacity and secrecy outage probability are derived for the considered realistic scenario.
Aashish Mathur +2 more
exaly +2 more sources
Relay-Assisted Communications over Multi-Cluster Two-Wave Fading Channels [PDF]
This paper examines the secrecy performance of a decode-and-forward (DF) relay-assisted device-to-device (D2D) communication system operating over Terahertz (THz) channels in multi-cluster two-wave (MTW) fading environments.
Muhammad Junaid Rabbani +4 more
doaj +2 more sources
On the Secrecy Performance of Land Mobile Satellite Communication Systems
In this paper, we investigate the secrecy performance against eavesdropping of a land mobile satellite (LMS) system, where the satellite employs the spot beam technique, and both the terrestrial user and eavesdropper are equipped with multiple antennas and utilize maximal ratio combining to receive the confidential message.
Kang An, Tao Liang, Xiaojuan Yan
exaly +3 more sources

