Results 31 to 40 of about 141,592 (289)

Physical Layer Security of WPCNs With Imperfect CSI and Full-Duplex Receiver Aided Jamming

open access: yesIEEE Access, 2019
In this paper, we investigate the secrecy performance of wireless powered communication networks (WPCNs) faced by multiple passive eavesdroppers, where the full-duplex (FD) receiver utilizes the harvested energy to send the artificial jamming for ...
Mu Li   +4 more
doaj   +1 more source

Secrecy performance of diffusion based molecular timing channels [PDF]

open access: yesIET Communications, 2020
Abstract Motivated by the study of security issues in molecular communication, this paper addresses the problem of secure communication in a bio‐inspired field where confidentiality of the information is of significant importance.
Gaurav Sharma, Ajay Singh
openaire   +2 more sources

PHYSICAL LAYER SECRECY ON WIRELESS NETWORK

open access: yesTạp chí Khoa học Đại học Đà Lạt, 2016
In this paper, we present an approach for wireless security based on physical layer. The basic principle of physical layer secrecy (PHY Secrecy) is ensuring secure information transmission in the the system that consists of illegal receiver without using
Trương Tiến Vũ   +3 more
doaj   +1 more source

Impact of Correlated Fading Channels on Cognitive Relay Networks With Generalized Relay Selection

open access: yesIEEE Access, 2018
In this paper, we investigate the secrecy performance of dual-hop decode-and-forward cognitive relay networks taking into account the channel correlation between the main and wiretapping channels.
Mu Li, Hao Yin, Yuzhen Huang, Yan Wang
doaj   +1 more source

Secure transmission in spectrum sharing MIMO channels with generalized antenna selection over Nakagami-m channels

open access: yesIEEE Access, 2016
We investigate the secrecy outage performance of spectrum sharing multiple-input multiple-output networks using generalized transmit antenna selection with maximal ratio combining over Nakagami-m channels.
Yuzhen Huang   +4 more
doaj   +1 more source

Secure Multiuser Scheduling for Hybrid Relay-Assisted Wireless Powered Cooperative Communication Networks With Full-Duplex Destination-Based Jamming

open access: yesIEEE Access, 2021
In this paper, we investigate secure communication in a hybrid relay (HR)-assisted wireless powered cooperative communication network (WPCCN), where an eavesdropper tries to intercept the data transmitted by a source user and the HR simultaneously.
Xiaohui Shang   +4 more
doaj   +1 more source

Secrecy performance of two‐way integrated satellite terrestrial relay networks with multiple users

open access: yesElectronics Letters, 2022
This letter studies the secrecy performance for a two‐way integrated satellite terrestrial relay networks. Particularly, multiple legitimate users along with maximal user scheduling scheme are applied in the considered networks.
Dongmei Yang   +4 more
doaj   +1 more source

Achievable Secrecy Rates of an Energy Harvesting Device [PDF]

open access: yes, 2016
The secrecy rate represents the amount of information per unit time that can be securely sent on a communication link. In this work, we investigate the achievable secrecy rates in an energy harvesting communication system composed of a transmitter, a ...
Biason, Alessandro   +2 more
core   +2 more sources

Physical Layer Secure Communication for Active Dual-RIS Assisted MISO System

open access: yesIEEE Access
This paper investigates physical layer security issues in a multiple-input single-output (MISO) network assisted by dual reconfigurable intelligent surfaces (RIS).
Jie Wen, Jianbo Ji, Dong Xie
doaj   +1 more source

RIS-Aided Mixed RF-FSO Wireless Networks: Secrecy Performance Analysis With Simultaneous Eavesdropping

open access: yesIEEE Access, 2023
In order to meet the demands of diverse services within sixth-generation networks across a range of industries, numerous approaches are being employed to address notable signal degradation resulting from channel obstruction, particularly in the realms of
Md. Mijanur Rahman   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy