Results 91 to 100 of about 139,758 (194)
Secure D2D underlaying cellular communication based on artificial noise assisted
A secure communication scheme based on artificial noise assisted from base station(BS)was proposed to improve the system secrecy rate of the D2D underlaying cellular.Firstly,the system secrecy rate was modeled.Then the BS with multi-antennas added ...
Xiao-lei KANG +2 more
doaj +2 more sources
On multiuser secrecy rate in flat fading channel
We consider a physical layer security based on the wiretap channel for wireless communication systems in which there are one transmitter and multiple receivers/users who report their channel state information (CSI) to the transmitter. This scenario is practically useful since it models the forward link of cellular systems where the systems can take ...
Hyoungsuk Jeon +4 more
openaire +3 more sources
Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel
Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interests for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication issue arises
Liu, Liang, Xing, Hong, Zhang, Rui
core +1 more source
In this paper, the physical layer secrecy performance of the classical Wyner wiretap channel with gamma-shadowed two-wave with diffuse power (GS-TWDP) composite fading is investigated.
Pamela Njemcevic, Almir Maric
doaj +1 more source
Secure Satellite Communication Systems Design with Individual Secrecy Rate Constraints
In this paper, we study multibeam satellite secure communication through physical (PHY) layer security techniques, i.e., joint power control and beamforming.
Han, Zhu +3 more
core +1 more source
Investigations on Secrecy Performance of Downlink Overlay CR-NOMA System With SIC Imperfections
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two technologies witnessed to offer tremendous possibilities for the next generation wireless networks to maximise their usage of available spectrum.
Kiran Kumar Godugu, Suseela Vappangi
doaj +1 more source
Probabilistic Robust Secure Beamforming in MISO Channels With Imperfect LCSI and Statistical ECSI
In this paper, we investigate the robust secure transmit beamformming design for multiple-input single-output wiretap channels overheard by multiple non-collaborating single-antenna eavesdroppers.
Jing Xu, Siwen Xu, Chongbin Xu
doaj +1 more source
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed wire-tapper who receives a degraded version of the signal at the ...
Tekin, Ender, Yener, Aylin
core +3 more sources
Weighted Sum Secrecy Rate Maximization for Joint ITS- and IRS-Empowered System. [PDF]
Yang S, Huang K, Niu H, Wang Y, Chu Z.
europepmc +1 more source
Secure Communication in Millimeter Wave Relaying Networks
The use of relay can expand the coverage of millimeter-wave (mmWave) signals, whereas it may increase the risk of information leakage due to the additional link from source to relay.
Ruiqian Ma +4 more
doaj +1 more source

