Results 41 to 50 of about 142,545 (277)

Securing Downlink Massive MIMO-NOMA Networks with Artificial Noise

open access: yes, 2019
In this paper, we focus on securing the confidential information of massive multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks by exploiting artificial noise (AN). An uplink training scheme is first proposed with minimum
Dobre, Octavia A.   +3 more
core   +1 more source

Secure Communications in Millimeter Wave Ad Hoc Networks [PDF]

open access: yes, 2017
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential ...
Heath Jr, Robert W.   +3 more
core   +2 more sources

Physical Layer Secure Communication for Active Dual-RIS Assisted MISO System

open access: yesIEEE Access
This paper investigates physical layer security issues in a multiple-input single-output (MISO) network assisted by dual reconfigurable intelligent surfaces (RIS).
Jie Wen, Jianbo Ji, Dong Xie
doaj   +1 more source

Secrecy performance of two‐way integrated satellite terrestrial relay networks with multiple users

open access: yesElectronics Letters, 2022
This letter studies the secrecy performance for a two‐way integrated satellite terrestrial relay networks. Particularly, multiple legitimate users along with maximal user scheduling scheme are applied in the considered networks.
Dongmei Yang   +4 more
doaj   +1 more source

RIS-Aided Mixed RF-FSO Wireless Networks: Secrecy Performance Analysis With Simultaneous Eavesdropping

open access: yesIEEE Access, 2023
In order to meet the demands of diverse services within sixth-generation networks across a range of industries, numerous approaches are being employed to address notable signal degradation resulting from channel obstruction, particularly in the realms of
Md. Mijanur Rahman   +5 more
doaj   +1 more source

On the Secrecy Performance of SWIPT Receiver Architectures with Multiple Eavesdroppers [PDF]

open access: yesWireless Communications and Mobile Computing, 2018
Physical layer security (PLS) has been shown to hold promise as a new paradigm for securing wireless links. In contrast with the conventional cryptographic techniques, PLS methods exploit the random fading in wireless channels to provide link security.
Furqan Jameel   +4 more
openaire   +3 more sources

Optimal Equivocation in Secrecy Systems a Special Case of Distortion-based Characterization

open access: yes, 2013
Recent work characterizing the optimal performance of secrecy systems has made use of a distortion-like metric for partial secrecy as a replacement for the more traditional metric of equivocation.
Cuff, Paul
core   +1 more source

Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]

open access: yes, 2017
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin   +5 more
core   +3 more sources

Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers

open access: yesEntropy, 2020
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency.
Yue Wu   +4 more
doaj   +1 more source

Physical Layer Security in Millimeter Wave Cellular Networks

open access: yes, 2016
Recent researches show that millimeter wave (mmWave) communications can offer orders of magnitude increases in the cellular capacity. However, the secrecy performance of a mmWave cellular network has not been investigated so far.
Wang, Chao, Wang, Hui-Ming
core   +1 more source

Home - About - Disclaimer - Privacy