Results 161 to 170 of about 139,758 (194)
Some of the next articles are maybe not open access.
Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper
IEEE Transactions on Vehicular Technology, 2014This paper studies different secrecy rate optimization problems for a multiple-input–multiple-output (MIMO) secrecy channel. In particular, we consider a scenario where a communication through a MIMO channel is overheard by a multiple-antenna eavesdropper.
Cumanan K +4 more
openaire +4 more sources
Maximum secrecy rate in inhomogeneous poisson networks
2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017The impressive growth of secrecy-sensitive wireless applications calls for methods to complement traditional cryptography. In particular, physical-layer security is attractive to enhance communication confidentiality by exploiting the characteristics of the wireless environment.
Chisci, Giovanni +3 more
openaire +3 more sources
Secrecy Rate Analysis for the Cooperative Communications
2023 12th International Conference on Awareness Science and Technology (iCAST), 2023Due to the character of low cost and easily to implemented, the cooperative communication is the future tendency. Three fundamental mode, Amplify-and-Forward (AF) mode, Decode-and-Forward (DF) mode and Compress and Forward (CF) mode are employed to the system.
Chen, Jong Shin +3 more
openaire +2 more sources
MIMO multi-user secrecy rate analysis
2014 IEEE International Conference on Communications (ICC), 2014In this paper, we consider the broadcast channel with confidential messages and eavesdroppers (BCCE), where a multi-antenna base station simultaneously communicates to multiple potentially malicious users, in the presence of external eavesdroppers randomly located according to a Poisson point process (PPP).
Giovanni Geraci +4 more
openaire +1 more source
Secrecy Rate Analysis Against Aerial Eavesdropper
IEEE Transactions on Communications, 2019This paper studies the threat that an aerial eavesdropper can pose to terrestrial wireless communications, from an information-theoretic point of view. The achievable ergodic and the average $\epsilon $ -outage secrecy rates with no channel state information at the transmitter (i.e., with no CSIT) are analyzed for a transmitter–receiver pair on ...
Xin Yuan +5 more
openaire +1 more source
Secrecy Rate of Time Switched Transmit Diversity System
2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), 2011Time switched transmit diversity (TSTD) system uses only one out of several transmit antennas at a time in order to exploit the benefit of transmit diversity while keeping the system simple by having only one RF chain. We show that while average rate of such a system remains similar to the capacity of the single transmit antenna, outage secrecy ...
Sinanovic, Sinan +2 more
openaire +1 more source
Secrecy rate with friendly full-duplex relay
2015 IEEE Wireless Communications and Networking Conference (WCNC), 2015This paper considers the use of a friendly full-duplex (FD) relay to increase the secrecy rate over a fading channel between the legitimate source and destination in the presence of a naive or informed eavesdropper. Naive eavesdropper can only decode the received signals either from the source or from the relay, while informed eavesdropper can overhear
Saeedeh Parsaeefard, Tho Le-Ngoc
openaire +1 more source
Secrecy sum-rate based illegitimate relay selection
Australian Journal of Electrical and Electronics Engineering, 2022This study presents the secrecy performance of sum-rate-based illegitimate relay selection policy for the two-way relay-assisted network. Two-hop multiple half- and full-duplex two-way illegitimate relay network and a limited number of friendly jammers, affecting to the illegitimate relays, are considered in the system model.
openaire +1 more source
Secrecy Rate Pair Constraints for Secure Throughput
2014 IEEE Military Communications Conference, 2014Physical layer security, which is an alternative to traditional cryptographic methods, has emerged as a promising candidate to protect wireless transmissions from an eavesdropper. An important measure of physical layer security is the secrecy outage: the event when the instantaneous secrecy capacity, which for the considered scenario is the difference ...
Kyle Morrison, Dennis Goeckel
openaire +1 more source
Ergodic Secrecy Rates of Secure Wireless Communications
2014 IEEE Military Communications Conference, 2014Two unified analytical frameworks that facilitate the evaluation of the ergodic secrecy rates of Wyner wiretap channel in generalized fading environments without/with diversity receivers are developed. In contrast to prior work that is limited to only the Rayleigh fading environment, our new formulas expressed in terms of only the moment generating ...
O. Olabiyi, A. Annamalai
openaire +1 more source

