Results 101 to 110 of about 139,758 (194)

On the Secrecy Capacity of Fading Channels

open access: yes, 2006
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized
Gamal, Hesham El   +2 more
core   +2 more sources

Evaluation of Secrecy Rate in Cooperative Communication System

open access: yesEPiC Series in Computing, 2019
Cooperative system is a tendency for future communications because of its spatial diversity to improve the system performance. However, the security is a critical issue in the wireless application with a highly private request. Although the encryption schemes have been proposed to approach the secure purpose, those schemes need a lot of computing ...
Cheng-Ying Yang   +2 more
openaire   +2 more sources

Secrecy Rate Region of SWIPT Wiretap Interference Channels

open access: yes, 2017
The secrecy rate region of wiretap interference channels with a multi-antenna passive eavesdropper is studied under receiver energy harvesting constraints. To stay operational in the network, the legitimate receivers demand energy alongside information, which is fulfilled by power transmission and exploiting a power splitting (PS) receiver.
Kariminezhad, Ali   +3 more
openaire   +2 more sources

Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case

open access: yesTongxin xuebao, 2020
A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also
Xiaohui ZHANG, Shunliang ZHANG, Bowen LI
doaj   +2 more sources

Effects of CSI Knowledge on Secrecy of Threshold-Selection Decode-and-Forward Relaying

open access: yesIEEE Access, 2017
This paper considers secrecy of a three node cooperative wireless system in the presence of a passive eavesdropper. The threshold-selection decode-and-forward relay is considered, which can decode the source message correctly only if a predefined signal ...
Chinmoy Kundu   +5 more
doaj   +1 more source

Max–Min Secrecy Rate and Secrecy Energy Efficiency Optimization for RIS-Aided VLC Systems: RSMA Versus NOMA

open access: yesIEEE Open Journal of Vehicular Technology
Integrating visible light communication (VLC) with the reconfigurable intelligent surface (RIS) significantly enhances physical layer security by enabling precise directional signal control and dynamic adaptation to the communication environment.
Omar Maraqa   +3 more
doaj   +1 more source

Advanced task-weighted meta-reinforcement learning for rapid secure routing in mobile RIS-assisted networks

open access: yesEURASIP Journal on Wireless Communications and Networking
This paper proposes a Reptile-based Meta-Reinforcement Learning (Meta-RL) framework for secure, adaptive multi-hop routing in Mobile Ad Hoc Networks (MANETs) enhanced by Reconfigurable Intelligent Surfaces (RIS).
M. Stella Mercy, R. Suresh Babu
doaj   +1 more source

Secrecy rates of finite-input intersymbol interference channels

open access: yes, 2016
Dışa açık doğaları gereği kablosuz iletişim ağlarında güvenliğin sağlanması kritik bir öneme sahiptir. Bu güvenliği fiziksel katmanda sağlamak ise üst katmandaki geleneksel şifreleme yöntemlerine hem iyi bir alternatif hem de ilave bir güvenliktir. Son on yıla baktığımızda, bir çok çalışma tarafından fiziksel katmandaki çalışmaların güvenliği sağlama ...
openaire   +3 more sources

Ergodic secrecy rate and outage probability in NOMA IRS massive MIMO networks with jamming. [PDF]

open access: yesSci Rep
Zhu M   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy