Results 21 to 30 of about 142,545 (277)

Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages

open access: yesEntropy, 2019
Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link ...
Yi Song   +4 more
doaj   +1 more source

Comprehensive Physical Layer Security Analysis of FSO Communications Over Málaga Channels

open access: yesIEEE Photonics Journal, 2020
In this article, we study the physical layer security of free-space optical (FSO) communications under different eavesdropping scenarios. More specifically, the secrecy performance of FSO communication employing intensity modulation/direct detection ...
Yun Ai   +4 more
doaj   +1 more source

On the secrecy performance of RIS-enabled wireless communications over Nakagami-m fading channels

open access: yesICT Express, 2023
This paper examines the secrecy performance of reconfigurable intelligent surface aided wireless communication systems. Specifically, we derive the secrecy outage probability (SOP), intercept probability, probability of non-zero secrecy capacity, and ...
Ashutosh K. Yadav   +3 more
doaj   +1 more source

Secrecy Outage Performance Analysis for Cooperative NOMA Over Nakagami- $m$ Channel

open access: yesIEEE Access, 2019
In this paper, we investigate the secrecy outage performance of a typical cooperative downlink non-orthogonal multiple access (NOMA) system over Nakagami-m fading channel, in which the base station transmits a superimposed signal to two users via a relay.
Chao Yu, Hak-Lim Ko, Xin Peng, Wenwu Xie
doaj   +1 more source

Impact of Self-Energy Recycling and Cooperative Jamming on SWIPT-Based FD Relay Networks With Secrecy Constraints

open access: yesIEEE Access, 2022
This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and power transfer cooperative relay network in the presence of an eavesdropper.
Isabella Wanderley Gomes Da Silva   +3 more
doaj   +1 more source

Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback [PDF]

open access: yes, 2013
Channel state information (CSI) at the transmitter is of importance to the performance of physical layer security based on multi-antenna networks. Specifically, CSI is not only beneficial to improve the capacity of the legitimate channel, but also can be
Chen, Xiaoming, Yin, Rui
core   +1 more source

Secrecy Performance of Land Mobile Satellite Systems With Imperfect Channel Estimation and Multiple Eavesdroppers

open access: yesIEEE Access, 2019
The inherent broadcast nature has exposed the land mobile satellite (LMS) communication systems to severe security threats in both the civil and military applications.
Yusheng Li   +3 more
doaj   +1 more source

Performance Analysis of Secret Precoding-Aided Spatial Modulation With Finite-Alphabet Signaling

open access: yesIEEE Access, 2018
The precoding-aided spatial modulation (PSM) is first characterized with respect to its secrecy performance, which shows that the PSM is a secrecy embedded communication scheme when operated in the time-division duplex mode, but experiences security risk
Feilong Wu   +3 more
doaj   +1 more source

Source-Channel Secrecy with Causal Disclosure [PDF]

open access: yes, 2012
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined.
Cuff, Paul   +3 more
core   +1 more source

On the Secrecy Performance of Mixed RF/UOW Communication System [PDF]

open access: yes2018 IEEE Globecom Workshops (GC Wkshps), 2018
In this paper, the secrecy performance of a dual-hop mixed radio-frequency/underwater optical wireless communication (RF/UOWC) system is investigated. The considered system consists of one single antenna source node ($S$) communicating with one destination node ($D$), considered as the legitimate receiver, through the help of one amplify-and-forward ...
Elmehdi Illi   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy