Results 251 to 260 of about 139,119 (288)
Some of the next articles are maybe not open access.

Secrecy Rate of Time Switched Transmit Diversity System

2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), 2011
Time switched transmit diversity (TSTD) system uses only one out of several transmit antennas at a time in order to exploit the benefit of transmit diversity while keeping the system simple by having only one RF chain. We show that while average rate of such a system remains similar to the capacity of the single transmit antenna, outage secrecy ...
Sinanovic, Sinan   +2 more
openaire   +1 more source

Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer

IEEE Transactions on Vehicular Technology, 2015
In this paper, we study different secrecy rate optimization techniques for a multiple-input–multiple-output (MIMO) secrecy channel, where a multiantenna cooperative jammer is employed to improve secret communication in the presence of a multiantenna eavesdropper.
Chu Z   +4 more
openaire   +2 more sources

Secrecy rate with friendly full-duplex relay

2015 IEEE Wireless Communications and Networking Conference (WCNC), 2015
This paper considers the use of a friendly full-duplex (FD) relay to increase the secrecy rate over a fading channel between the legitimate source and destination in the presence of a naive or informed eavesdropper. Naive eavesdropper can only decode the received signals either from the source or from the relay, while informed eavesdropper can overhear
Saeedeh Parsaeefard, Tho Le-Ngoc
openaire   +1 more source

Secrecy sum-rate based illegitimate relay selection

Australian Journal of Electrical and Electronics Engineering, 2022
This study presents the secrecy performance of sum-rate-based illegitimate relay selection policy for the two-way relay-assisted network. Two-hop multiple half- and full-duplex two-way illegitimate relay network and a limited number of friendly jammers, affecting to the illegitimate relays, are considered in the system model.
openaire   +1 more source

Secrecy Rate Pair Constraints for Secure Throughput

2014 IEEE Military Communications Conference, 2014
Physical layer security, which is an alternative to traditional cryptographic methods, has emerged as a promising candidate to protect wireless transmissions from an eavesdropper. An important measure of physical layer security is the secrecy outage: the event when the instantaneous secrecy capacity, which for the considered scenario is the difference ...
Kyle Morrison, Dennis Goeckel
openaire   +1 more source

Ergodic Secrecy Rates of Secure Wireless Communications

2014 IEEE Military Communications Conference, 2014
Two unified analytical frameworks that facilitate the evaluation of the ergodic secrecy rates of Wyner wiretap channel in generalized fading environments without/with diversity receivers are developed. In contrast to prior work that is limited to only the Rayleigh fading environment, our new formulas expressed in terms of only the moment generating ...
O. Olabiyi, A. Annamalai
openaire   +1 more source

Going beyond Secrecy Rate via Information Jamming

2018 IEEE Global Communications Conference (GLOBECOM), 2018
Cooperative jamming approach has been commonly used in the field of physical layer security to achieve a good secrecy rate of wireless networks. In this approach, the Gaussian noise signal sent by a friendly jammer can disrupt the reception of the eavesdropper, however, it may also interfere with the legitimate receiver.
Haiyang Zhang, Lingjie Duan
openaire   +1 more source

Efficient Algorithm for Selecting Secrecy Rate Maximizing Antennas

IEEE Communications Letters, 2013
Antenna selection (AS) is poised to provide solutions to hardware complexity issues while guaranteeing untappable information flow. We investigate the AS problem set up in the context of linear precoder design for secrecy rate maximization of a multiple-input single-output system. The original problem is both non-tractable and nonconvex.
openaire   +1 more source

Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper

IEEE Transactions on Vehicular Technology, 2014
This paper studies different secrecy rate optimization problems for a multiple-input–multiple-output (MIMO) secrecy channel. In particular, we consider a scenario where a communication through a MIMO channel is overheard by a multiple-antenna eavesdropper.
Cumanan K   +4 more
openaire   +2 more sources

Secrecy Rate of MISO Optical Wireless Scattering Communications

IEEE Transactions on Communications, 2018
We consider the secrecy rate for the multiple-input single-output optical wireless scattering communication, where the detected signal can be characterized by discrete photoelectrons. Assuming a legitimate receiver and an eavesdropper, we propose two secure communication protocols, the non-jamming protocol, and the cooperative jamming protocol, where ...
Difan Zou, Chen Gong, Zhengyuan Xu
openaire   +1 more source

Home - About - Disclaimer - Privacy