On Secrecy Outage Probability and Average Secrecy Rate of Large‐Scale Cellular Networks
We investigate the secrecy performance in large‐scale cellular networks, where both Base Stations (BSs) and eavesdroppers follow independent and different homogeneous Poisson point processes (PPPs). Based on the distances between the BS and user, the intended user selects the nearest BS as serving BS to transmit the confidential information.
Liwei Tao +3 more
openaire +1 more source
UAV-Aided Jamming for Secure Ground Communication With Unknown Eavesdropper Location
This paper investigates unmanned aerial vehicle (UAV)-aided jamming technique for enabling physical layer keyless security in scenarios where the exact eavesdropper location is unknown.
Christantus Obinna Nnamani +2 more
doaj +1 more source
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin +5 more
core +3 more sources
Impact of Heterogeneity and Secrecy on theCapacity of Wireless Sensor Networks
This paper investigates the achievable secrecy throughput of an inhomogeneous wireless sensor network. We consider the impact of topology heterogeneity and the secrecy constraint on the throughput. For the topology heterogeneity, by virtue of percolation
Qiuming Liu, Li Yu, Zuhao Liu, Jun Zheng
doaj +1 more source
Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networks
This paper considers secure communication in buffer-aided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes.
Jiayu Zhou, Deli Qiao, Haifeng Qian
doaj +1 more source
pRate: Anonymous Star Rating with Rating Secrecy
We introduce pRate, a novel reputation management scheme with strong security and privacy guarantees for the users and their reputation scores. The reputation scores are computed based on the (aggregated) number(s) of stars that users receive from their raters.
Liu, Jia, Manulis, Mark
openaire +3 more sources
Performance Analysis of Secret Precoding-Aided Spatial Modulation With Finite-Alphabet Signaling
The precoding-aided spatial modulation (PSM) is first characterized with respect to its secrecy performance, which shows that the PSM is a secrecy embedded communication scheme when operated in the time-division duplex mode, but experiences security risk
Feilong Wu +3 more
doaj +1 more source
Physical Layer Security Design for FDD IM-OTFS Transmissions Based on Secure Mapping
In this paper, a physical layer security scheme is proposed for index modulation aided orthogonal time frequency space (IM-OTFS) modulation systems working in Frequency Division Duplex (FDD) mode.
Kejia Ma +3 more
doaj +1 more source
Secrecy Rate Optimizations for MIMO Communication Radar [PDF]
In this paper, we investigate transmit beampattern optimization techniques for a multiple-input multiple-output radar in the presence of a legitimate communications receiver and an eavesdropping target. The primary objectives of the radar are to satisfy a certain target-detection criterion and to simultaneously communicate safely with a legitimate ...
Anastasios Deligiannis +3 more
openaire +2 more sources
Secure Massive MIMO Downlink With Low-Resolution ADCs/DACs in the Presence of Active Eavesdropping
In this paper we study the secrecy performance of a downlink massive multiple-input multiple-output (MIMO) system in the presence of pilot spoofing attack (PSA). Specifically, the base station (BS), which is equipped with low-resolution analog-to-digital
Qian Xu, Pinyi Ren
doaj +1 more source

