Results 11 to 20 of about 139,334 (281)

Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2016
This paper investigates secrecy rate optimization problems for a multiple-input-single-output (MISO) secrecy channel in the presence of multiple multiantenna eavesdroppers. Specifically, we consider power minimization and secrecy rate maximization problems for this secrecy network.
Chu Z, Xing H, Johnston M, Le Goff S
openaire   +4 more sources

On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input [PDF]

open access: yesIEEE Transactions on Communications, 2012
This work investigates the effect of finite-alphabet source input on the secrecy rate of a multi-antenna wiretap system. Existing works have characterized maximum achievable secrecy rate or secrecy capacity for single and multiple antenna systems based ...
Bashar, Shafi   +2 more
core   +5 more sources

Outage constrained secrecy rate maximization using cooperative jamming [PDF]

open access: yes2012 IEEE Statistical Signal Processing Workshop (SSP), 2012
We consider a Gaussian MISO wiretap channel, where a multi-antenna source communicates with a single-antenna destination in the presence of a single-antenna eavesdropper. The communication is assisted by multi-antenna helpers that act as jammers to the eavesdropper.
Luo, Shuangyu   +2 more
openaire   +2 more sources

Secrecy & Rate Adaptation for secure HARQ protocols [PDF]

open access: yes2013 IEEE Information Theory Workshop (ITW), 2013
This paper is dedicated to the study of HARQ protocols under a secrecy constraint. An encoder sends information to a legitimate decoder while keeping it secret from the eavesdrop-per. Our objective is to provide a coding scheme that satisfies both reliability and confidentiality conditions.
Le Treust, MaĆ«l   +2 more
openaire   +1 more source

Ergodic Secrecy Rate Analysis and Optimal Power Allocation for Symbiotic Radio Networks

open access: yesIEEE Access, 2023
In this paper, we address the challenge of establishing secure communication within a symbiotic radio (SR) network. This network comprises a primary transmitter (PT), a primary receiver (PR), a passive backscatter device (BD), and an eavesdropper (ED ...
Azzam Al-Nahari   +4 more
doaj   +1 more source

Weighted Sum Secrecy Rate Maximization Using Intelligent Reflecting Surface [PDF]

open access: yesIEEE Transactions on Communications, 2021
This paper aims to investigate the benefit of using intelligent reflecting surface (IRS) in multi-user multiple-input single-output (MU-MISO) systems, in the presence of eavesdroppers. We maximize the weighted sum secrecy rate by jointly designing the secure beamforming (BF), the artificial noise (AN), as well as the phase shift of the IRS.
Hehao Niu   +5 more
openaire   +2 more sources

Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding [PDF]

open access: yes, 2012
In this paper, we propose a linear precoder for the downlink of a multi-user MIMO system with multiple users that potentially act as eavesdroppers. The proposed precoder is based on regularized channel inversion (RCI) with a regularization parameter ...
Collings, Iain B.   +4 more
core   +1 more source

Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access [PDF]

open access: yesIEEE Communications Letters, 2016
Non-orthogonal multiple access (NOMA) has been recognized as a promising technique for providing high data rates in 5G systems. This letter is to study physical layer security in a single-input single-output (SISO) NOMA system consisting of a transmitter, multiple legitimate users and an eavesdropper.
Zhang, Yi   +3 more
openaire   +3 more sources

Secrecy Rate Analysis of Opportunistic User Scheduling in Uplink Networks With Potential Eavesdroppers

open access: yesIEEE Access, 2019
In this paper, we investigate two user scheduling algorithms (optimal user and threshold-based user scheduling algorithms) when we consider potential eavesdroppers in an uplink wiretap network. The optimal user scheduling (OUS) algorithm selects the user
Inkyu Bang, Bang Chul Jung
doaj   +1 more source

Evolutionary Game-Based Secrecy Rate Adaptation in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Physical layer security, whose aim is to maximize the secrecy rate of a source while keeping eavesdroppers ignorant of data transmitted, is extremely suitable for Wireless Sensor Networks (WSNs). We therefore, by developing the classical wire-tap channel,
Guanxiong Jiang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy