Results 21 to 30 of about 141,592 (289)

SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels

open access: yesIEEE Access, 2018
A new paradigm of uplink non-orthogonal multiple access along with multiple eavesdroppers to achieve secrecy transmission is studied in this paper.
Kaiwei Jiang   +4 more
doaj   +1 more source

Impact of Self-Energy Recycling and Cooperative Jamming on SWIPT-Based FD Relay Networks With Secrecy Constraints

open access: yesIEEE Access, 2022
This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and power transfer cooperative relay network in the presence of an eavesdropper.
Isabella Wanderley Gomes Da Silva   +3 more
doaj   +1 more source

Secrecy Outage Performance Analysis for Cooperative NOMA Over Nakagami- $m$ Channel

open access: yesIEEE Access, 2019
In this paper, we investigate the secrecy outage performance of a typical cooperative downlink non-orthogonal multiple access (NOMA) system over Nakagami-m fading channel, in which the base station transmits a superimposed signal to two users via a relay.
Chao Yu, Hak-Lim Ko, Xin Peng, Wenwu Xie
doaj   +1 more source

Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]

open access: yes, 2017
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin   +5 more
core   +3 more sources

Secrecy performance of terahertz wireless links in rain and snow [PDF]

open access: yesNano Communication Networks, 2021
Wireless communication technique at terahertz (THz) frequencies is regarded as the most potential candidate for future wireless networks due to its wider frequency bandwidth and higher data capacity when compared to that employing radio frequency (RF) and millimeter wave (mmWave).
Rong Wang   +3 more
openaire   +2 more sources

Secrecy Performance of Land Mobile Satellite Systems With Imperfect Channel Estimation and Multiple Eavesdroppers

open access: yesIEEE Access, 2019
The inherent broadcast nature has exposed the land mobile satellite (LMS) communication systems to severe security threats in both the civil and military applications.
Yusheng Li   +3 more
doaj   +1 more source

Cooperation Diversity for Secrecy Enhancement in Cognitive Relay Wiretap Network Over Correlated Fading Channels

open access: yesIEEE Access, 2018
In this paper, we investigate the secrecy performance of dual-hop randomize-and-forward (RaF) cognitive relay multi-channel wiretap networks over correlated fading channels, in which the eavesdropper can wiretap the information from source and relays ...
Mu Li   +4 more
doaj   +1 more source

Performance Analysis of Secret Precoding-Aided Spatial Modulation With Finite-Alphabet Signaling

open access: yesIEEE Access, 2018
The precoding-aided spatial modulation (PSM) is first characterized with respect to its secrecy performance, which shows that the PSM is a secrecy embedded communication scheme when operated in the time-division duplex mode, but experiences security risk
Feilong Wu   +3 more
doaj   +1 more source

Secrecy Performance Analysis of Two-Way Relay Non-Orthogonal Multiple Access Systems

open access: yesIEEE Access, 2020
This paper studies physical layer security for two-way relay non-orthogonal multiple access systems. Specifically, by employing a decode-and-forward relay and considering both the maximum-ratio combining and selection combining schemes at the ...
Mahendra K. Shukla   +2 more
doaj   +1 more source

Source-Channel Secrecy with Causal Disclosure [PDF]

open access: yes, 2012
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined.
Cuff, Paul   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy