Results 1 to 10 of about 139,119 (288)

Resource allocation for secure Gaussian parallel relay channels with finite-length coding and discrete constellations

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
We investigate the transmission of a secret message from Alice to Bob in the presence of an eavesdropper (Eve) and many of decode-and-forward relay nodes.
Linda Senigagliesi   +2 more
doaj   +2 more sources

Intelligent reflecting surface-aided MIMO secrecy rate maximization

open access: yesICT Express, 2022
This paper considers the intelligent reflecting surface-aided MIMO secrecy rate maximization. We apply the alternating optimization to maximize the secrecy rate of the MIMO wiretap channels. We first provide the closed-form solution to each subproblem of
Minsik Kim, Daeyoung Park
doaj   +2 more sources

Achievable Secrecy Rates of an Energy Harvesting Device [PDF]

open access: yesIEEE Journal on Selected Areas in Communications, 2016
The secrecy rate represents the amount of information per unit time that can be securely sent on a communication link. In this work, we investigate the achievable secrecy rates in an energy harvesting communication system composed of a transmitter, a ...
Biason, Alessandro   +2 more
core   +4 more sources

Achievable secrecy rate analysis in mmWave ad hoc networks with multi‐array antenna transmission and artificial noise

open access: yesIET Communications, 2021
This paper analyzes the achievable secrecy rate in a millimeter wave (mmWave) ad hoc network with multi‐array antenna transmission in the presence of non‐colluding and colluding eavesdroppers.
Ahmed Fathy Darwesh, Abraham O. Fapojuwo
doaj   +1 more source

Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers

open access: yesEntropy, 2020
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency.
Yue Wu   +4 more
doaj   +1 more source

Security Analysis of QAM Quantum-Noise Randomized Cipher System

open access: yesIEEE Photonics Journal, 2020
Applying the quadrature amplitude modulation (QAM) format, quantum-noise randomized cipher (QNRC) systems hide the signal states in quantum phase noise and amplitude noise to prevent eavesdropping. In this paper, based on the traditional wire-tap channel
Yukai Chen   +4 more
doaj   +1 more source

Ergodic Secrecy Rate Analysis and Optimal Power Allocation for Symbiotic Radio Networks

open access: yesIEEE Access, 2023
In this paper, we address the challenge of establishing secure communication within a symbiotic radio (SR) network. This network comprises a primary transmitter (PT), a primary receiver (PR), a passive backscatter device (BD), and an eavesdropper (ED ...
Azzam Al-Nahari   +4 more
doaj   +1 more source

On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input [PDF]

open access: yes, 2012
This work investigates the effect of finite-alphabet source input on the secrecy rate of a multi-antenna wiretap system. Existing works have characterized maximum achievable secrecy rate or secrecy capacity for single and multiple antenna systems based ...
Bashar, Shafi   +2 more
core   +3 more sources

Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding [PDF]

open access: yes, 2012
In this paper, we propose a linear precoder for the downlink of a multi-user MIMO system with multiple users that potentially act as eavesdroppers. The proposed precoder is based on regularized channel inversion (RCI) with a regularization parameter ...
Collings, Iain B.   +4 more
core   +1 more source

Secrecy Rate Analysis of Opportunistic User Scheduling in Uplink Networks With Potential Eavesdroppers

open access: yesIEEE Access, 2019
In this paper, we investigate two user scheduling algorithms (optimal user and threshold-based user scheduling algorithms) when we consider potential eavesdroppers in an uplink wiretap network. The optimal user scheduling (OUS) algorithm selects the user
Inkyu Bang, Bang Chul Jung
doaj   +1 more source

Home - About - Disclaimer - Privacy