Results 91 to 100 of about 139,758 (194)

Secure D2D underlaying cellular communication based on artificial noise assisted

open access: yesTongxin xuebao, 2015
A secure communication scheme based on artificial noise assisted from base station(BS)was proposed to improve the system secrecy rate of the D2D underlaying cellular.Firstly,the system secrecy rate was modeled.Then the BS with multi-antennas added ...
Xiao-lei KANG   +2 more
doaj   +2 more sources

On multiuser secrecy rate in flat fading channel

open access: yesMILCOM 2009 - 2009 IEEE Military Communications Conference, 2009
We consider a physical layer security based on the wiretap channel for wireless communication systems in which there are one transmitter and multiple receivers/users who report their channel state information (CSI) to the transmitter. This scenario is practically useful since it models the forward link of cellular systems where the systems can take ...
Hyoungsuk Jeon   +4 more
openaire   +3 more sources

Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel

open access: yes, 2015
Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interests for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication issue arises
Liu, Liang, Xing, Hong, Zhang, Rui
core   +1 more source

Physical Layer Secrecy Performance Analysis Over Gamma-Shadowed Two-Wave With Diffuse Power Composite Fading Channels

open access: yesIEEE Access
In this paper, the physical layer secrecy performance of the classical Wyner wiretap channel with gamma-shadowed two-wave with diffuse power (GS-TWDP) composite fading is investigated.
Pamela Njemcevic, Almir Maric
doaj   +1 more source

Secure Satellite Communication Systems Design with Individual Secrecy Rate Constraints

open access: yes, 2011
In this paper, we study multibeam satellite secure communication through physical (PHY) layer security techniques, i.e., joint power control and beamforming.
Han, Zhu   +3 more
core   +1 more source

Investigations on Secrecy Performance of Downlink Overlay CR-NOMA System With SIC Imperfections

open access: yesIEEE Access
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two technologies witnessed to offer tremendous possibilities for the next generation wireless networks to maximise their usage of available spectrum.
Kiran Kumar Godugu, Suseela Vappangi
doaj   +1 more source

Probabilistic Robust Secure Beamforming in MISO Channels With Imperfect LCSI and Statistical ECSI

open access: yesIEEE Access, 2017
In this paper, we investigate the robust secure transmit beamformming design for multiple-input single-output wiretap channels overheard by multiple non-collaborating single-antenna eavesdroppers.
Jing Xu, Siwen Xu, Chongbin Xu
doaj   +1 more source

The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints

open access: yes, 2006
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed wire-tapper who receives a degraded version of the signal at the ...
Tekin, Ender, Yener, Aylin
core   +3 more sources

Secure Communication in Millimeter Wave Relaying Networks

open access: yesIEEE Access, 2019
The use of relay can expand the coverage of millimeter-wave (mmWave) signals, whereas it may increase the risk of information leakage due to the additional link from source to relay.
Ruiqian Ma   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy