Results 21 to 30 of about 139,119 (288)

On Secrecy Outage Probability and Average Secrecy Rate of Large‐Scale Cellular Networks

open access: yesWireless Communications and Mobile Computing, 2018
We investigate the secrecy performance in large‐scale cellular networks, where both Base Stations (BSs) and eavesdroppers follow independent and different homogeneous Poisson point processes (PPPs). Based on the distances between the BS and user, the intended user selects the nearest BS as serving BS to transmit the confidential information.
Liwei Tao   +3 more
openaire   +1 more source

UAV-Aided Jamming for Secure Ground Communication With Unknown Eavesdropper Location

open access: yesIEEE Access, 2020
This paper investigates unmanned aerial vehicle (UAV)-aided jamming technique for enabling physical layer keyless security in scenarios where the exact eavesdropper location is unknown.
Christantus Obinna Nnamani   +2 more
doaj   +1 more source

Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]

open access: yes, 2017
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin   +5 more
core   +3 more sources

Impact of Heterogeneity and Secrecy on theCapacity of Wireless Sensor Networks

open access: yesSensors, 2015
This paper investigates the achievable secrecy throughput of an inhomogeneous wireless sensor network. We consider the impact of topology heterogeneity and the secrecy constraint on the throughput. For the topology heterogeneity, by virtue of percolation
Qiuming Liu, Li Yu, Zuhao Liu, Jun Zheng
doaj   +1 more source

Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
This paper considers secure communication in buffer-aided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes.
Jiayu Zhou, Deli Qiao, Haifeng Qian
doaj   +1 more source

pRate: Anonymous Star Rating with Rating Secrecy

open access: yes, 2019
We introduce pRate, a novel reputation management scheme with strong security and privacy guarantees for the users and their reputation scores. The reputation scores are computed based on the (aggregated) number(s) of stars that users receive from their raters.
Liu, Jia, Manulis, Mark
openaire   +3 more sources

Performance Analysis of Secret Precoding-Aided Spatial Modulation With Finite-Alphabet Signaling

open access: yesIEEE Access, 2018
The precoding-aided spatial modulation (PSM) is first characterized with respect to its secrecy performance, which shows that the PSM is a secrecy embedded communication scheme when operated in the time-division duplex mode, but experiences security risk
Feilong Wu   +3 more
doaj   +1 more source

Physical Layer Security Design for FDD IM-OTFS Transmissions Based on Secure Mapping

open access: yesIEEE Access, 2023
In this paper, a physical layer security scheme is proposed for index modulation aided orthogonal time frequency space (IM-OTFS) modulation systems working in Frequency Division Duplex (FDD) mode.
Kejia Ma   +3 more
doaj   +1 more source

Secrecy Rate Optimizations for MIMO Communication Radar [PDF]

open access: yesIEEE Transactions on Aerospace and Electronic Systems, 2018
In this paper, we investigate transmit beampattern optimization techniques for a multiple-input multiple-output radar in the presence of a legitimate communications receiver and an eavesdropping target. The primary objectives of the radar are to satisfy a certain target-detection criterion and to simultaneously communicate safely with a legitimate ...
Anastasios Deligiannis   +3 more
openaire   +2 more sources

Secure Massive MIMO Downlink With Low-Resolution ADCs/DACs in the Presence of Active Eavesdropping

open access: yesIEEE Access, 2020
In this paper we study the secrecy performance of a downlink massive multiple-input multiple-output (MIMO) system in the presence of pilot spoofing attack (PSA). Specifically, the base station (BS), which is equipped with low-resolution analog-to-digital
Qian Xu, Pinyi Ren
doaj   +1 more source

Home - About - Disclaimer - Privacy