Results 41 to 50 of about 142,545 (277)
Securing Downlink Massive MIMO-NOMA Networks with Artificial Noise
In this paper, we focus on securing the confidential information of massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks by exploiting artificial noise (AN). An uplink training scheme is first proposed with minimum
Dobre, Octavia A. +3 more
core +1 more source
Secure Communications in Millimeter Wave Ad Hoc Networks [PDF]
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential ...
Heath Jr, Robert W. +3 more
core +2 more sources
Physical Layer Secure Communication for Active Dual-RIS Assisted MISO System
This paper investigates physical layer security issues in a multiple-input single-output (MISO) network assisted by dual reconfigurable intelligent surfaces (RIS).
Jie Wen, Jianbo Ji, Dong Xie
doaj +1 more source
Secrecy performance of two‐way integrated satellite terrestrial relay networks with multiple users
This letter studies the secrecy performance for a two‐way integrated satellite terrestrial relay networks. Particularly, multiple legitimate users along with maximal user scheduling scheme are applied in the considered networks.
Dongmei Yang +4 more
doaj +1 more source
In order to meet the demands of diverse services within sixth-generation networks across a range of industries, numerous approaches are being employed to address notable signal degradation resulting from channel obstruction, particularly in the realms of
Md. Mijanur Rahman +5 more
doaj +1 more source
On the Secrecy Performance of SWIPT Receiver Architectures with Multiple Eavesdroppers [PDF]
Physical layer security (PLS) has been shown to hold promise as a new paradigm for securing wireless links. In contrast with the conventional cryptographic techniques, PLS methods exploit the random fading in wireless channels to provide link security.
Furqan Jameel +4 more
openaire +3 more sources
Optimal Equivocation in Secrecy Systems a Special Case of Distortion-based Characterization
Recent work characterizing the optimal performance of secrecy systems has made use of a distortion-like metric for partial secrecy as a replacement for the more traditional metric of equivocation.
Cuff, Paul
core +1 more source
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin +5 more
core +3 more sources
Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency.
Yue Wu +4 more
doaj +1 more source
Physical Layer Security in Millimeter Wave Cellular Networks
Recent researches show that millimeter wave (mmWave) communications can offer orders of magnitude increases in the cellular capacity. However, the secrecy performance of a mmWave cellular network has not been investigated so far.
Wang, Chao, Wang, Hui-Ming
core +1 more source

