Results 251 to 260 of about 139,119 (288)
Some of the next articles are maybe not open access.
Secrecy Rate of Time Switched Transmit Diversity System
2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), 2011Time switched transmit diversity (TSTD) system uses only one out of several transmit antennas at a time in order to exploit the benefit of transmit diversity while keeping the system simple by having only one RF chain. We show that while average rate of such a system remains similar to the capacity of the single transmit antenna, outage secrecy ...
Sinanovic, Sinan +2 more
openaire +1 more source
Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer
IEEE Transactions on Vehicular Technology, 2015In this paper, we study different secrecy rate optimization techniques for a multiple-input–multiple-output (MIMO) secrecy channel, where a multiantenna cooperative jammer is employed to improve secret communication in the presence of a multiantenna eavesdropper.
Chu Z +4 more
openaire +2 more sources
Secrecy rate with friendly full-duplex relay
2015 IEEE Wireless Communications and Networking Conference (WCNC), 2015This paper considers the use of a friendly full-duplex (FD) relay to increase the secrecy rate over a fading channel between the legitimate source and destination in the presence of a naive or informed eavesdropper. Naive eavesdropper can only decode the received signals either from the source or from the relay, while informed eavesdropper can overhear
Saeedeh Parsaeefard, Tho Le-Ngoc
openaire +1 more source
Secrecy sum-rate based illegitimate relay selection
Australian Journal of Electrical and Electronics Engineering, 2022This study presents the secrecy performance of sum-rate-based illegitimate relay selection policy for the two-way relay-assisted network. Two-hop multiple half- and full-duplex two-way illegitimate relay network and a limited number of friendly jammers, affecting to the illegitimate relays, are considered in the system model.
openaire +1 more source
Secrecy Rate Pair Constraints for Secure Throughput
2014 IEEE Military Communications Conference, 2014Physical layer security, which is an alternative to traditional cryptographic methods, has emerged as a promising candidate to protect wireless transmissions from an eavesdropper. An important measure of physical layer security is the secrecy outage: the event when the instantaneous secrecy capacity, which for the considered scenario is the difference ...
Kyle Morrison, Dennis Goeckel
openaire +1 more source
Ergodic Secrecy Rates of Secure Wireless Communications
2014 IEEE Military Communications Conference, 2014Two unified analytical frameworks that facilitate the evaluation of the ergodic secrecy rates of Wyner wiretap channel in generalized fading environments without/with diversity receivers are developed. In contrast to prior work that is limited to only the Rayleigh fading environment, our new formulas expressed in terms of only the moment generating ...
O. Olabiyi, A. Annamalai
openaire +1 more source
Going beyond Secrecy Rate via Information Jamming
2018 IEEE Global Communications Conference (GLOBECOM), 2018Cooperative jamming approach has been commonly used in the field of physical layer security to achieve a good secrecy rate of wireless networks. In this approach, the Gaussian noise signal sent by a friendly jammer can disrupt the reception of the eavesdropper, however, it may also interfere with the legitimate receiver.
Haiyang Zhang, Lingjie Duan
openaire +1 more source
Efficient Algorithm for Selecting Secrecy Rate Maximizing Antennas
IEEE Communications Letters, 2013Antenna selection (AS) is poised to provide solutions to hardware complexity issues while guaranteeing untappable information flow. We investigate the AS problem set up in the context of linear precoder design for secrecy rate maximization of a multiple-input single-output system. The original problem is both non-tractable and nonconvex.
openaire +1 more source
Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper
IEEE Transactions on Vehicular Technology, 2014This paper studies different secrecy rate optimization problems for a multiple-input–multiple-output (MIMO) secrecy channel. In particular, we consider a scenario where a communication through a MIMO channel is overheard by a multiple-antenna eavesdropper.
Cumanan K +4 more
openaire +2 more sources
Secrecy Rate of MISO Optical Wireless Scattering Communications
IEEE Transactions on Communications, 2018We consider the secrecy rate for the multiple-input single-output optical wireless scattering communication, where the detected signal can be characterized by discrete photoelectrons. Assuming a legitimate receiver and an eavesdropper, we propose two secure communication protocols, the non-jamming protocol, and the cooperative jamming protocol, where ...
Difan Zou, Chen Gong, Zhengyuan Xu
openaire +1 more source

