Results 21 to 30 of about 139,758 (194)

Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback [PDF]

open access: yes, 2013
Channel state information (CSI) at the transmitter is of importance to the performance of physical layer security based on multi-antenna networks. Specifically, CSI is not only beneficial to improve the capacity of the legitimate channel, but also can be
Chen, Xiaoming, Yin, Rui
core   +1 more source

On Secrecy Outage Probability and Average Secrecy Rate of Large‐Scale Cellular Networks

open access: yesWireless Communications and Mobile Computing, 2018
We investigate the secrecy performance in large‐scale cellular networks, where both Base Stations (BSs) and eavesdroppers follow independent and different homogeneous Poisson point processes (PPPs). Based on the distances between the BS and user, the intended user selects the nearest BS as serving BS to transmit the confidential information.
Liwei Tao   +3 more
openaire   +1 more source

UAV-Aided Jamming for Secure Ground Communication With Unknown Eavesdropper Location

open access: yesIEEE Access, 2020
This paper investigates unmanned aerial vehicle (UAV)-aided jamming technique for enabling physical layer keyless security in scenarios where the exact eavesdropper location is unknown.
Christantus Obinna Nnamani   +2 more
doaj   +1 more source

Impact of Heterogeneity and Secrecy on theCapacity of Wireless Sensor Networks

open access: yesSensors, 2015
This paper investigates the achievable secrecy throughput of an inhomogeneous wireless sensor network. We consider the impact of topology heterogeneity and the secrecy constraint on the throughput. For the topology heterogeneity, by virtue of percolation
Qiuming Liu, Li Yu, Zuhao Liu, Jun Zheng
doaj   +1 more source

pRate: Anonymous Star Rating with Rating Secrecy

open access: yes, 2019
We introduce pRate, a novel reputation management scheme with strong security and privacy guarantees for the users and their reputation scores. The reputation scores are computed based on the (aggregated) number(s) of stars that users receive from their raters.
Liu, Jia, Manulis, Mark
openaire   +3 more sources

Performance Analysis of Secret Precoding-Aided Spatial Modulation With Finite-Alphabet Signaling

open access: yesIEEE Access, 2018
The precoding-aided spatial modulation (PSM) is first characterized with respect to its secrecy performance, which shows that the PSM is a secrecy embedded communication scheme when operated in the time-division duplex mode, but experiences security risk
Feilong Wu   +3 more
doaj   +1 more source

Physical Layer Security Design for FDD IM-OTFS Transmissions Based on Secure Mapping

open access: yesIEEE Access, 2023
In this paper, a physical layer security scheme is proposed for index modulation aided orthogonal time frequency space (IM-OTFS) modulation systems working in Frequency Division Duplex (FDD) mode.
Kejia Ma   +3 more
doaj   +1 more source

PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL [PDF]

open access: yesICTACT Journal on Communication Technology, 2014
The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical ...
Vaibhav Kumar Gupta, Poonam Jindal
doaj  

Secure Massive MIMO Downlink With Low-Resolution ADCs/DACs in the Presence of Active Eavesdropping

open access: yesIEEE Access, 2020
In this paper we study the secrecy performance of a downlink massive multiple-input multiple-output (MIMO) system in the presence of pilot spoofing attack (PSA). Specifically, the base station (BS), which is equipped with low-resolution analog-to-digital
Qian Xu, Pinyi Ren
doaj   +1 more source

Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
This paper considers secure communication in buffer-aided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes.
Jiayu Zhou, Deli Qiao, Haifeng Qian
doaj   +1 more source

Home - About - Disclaimer - Privacy