Results 31 to 40 of about 139,119 (288)

PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL [PDF]

open access: yesICTACT Journal on Communication Technology, 2014
The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical ...
Vaibhav Kumar Gupta, Poonam Jindal
doaj  

Jamming-Aided Secrecy Performance in Secure Uplink NOMA System

open access: yesIEEE Access, 2020
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work.
Kaiwei Jiang, Weihua Zhou, Lingjie Sun
doaj   +1 more source

Enhancing wireless security via optimal cooperative jamming [PDF]

open access: yes, 2012
In this work, we analyze the secrecy rate in a cooperative network, where a source node is assisted by relay nodes via cooperative jamming for delivering a secret message to the destination in the presence of an eavesdropper node.
Gurbuz, Ozgur   +3 more
core   +1 more source

Monetary policy, secrecy, and federal funds rate behavior [PDF]

open access: yesJournal of Monetary Economics, 1985
Abstract The behavior of the Federal Reserve System can be characterized as secretive. One common justification for this secrecy is the financial markets will overreact to information, causing undue variability in interest rates. This paper examines the credibility of this assertion under the post-October 1979 non-borrowed reserves operating ...
openaire   +2 more sources

On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying With Cooperative Jamming and SWIPT

open access: yesIEEE Access, 2019
This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission protocol, where a source sends confidential information to a destination via an energy-constrained UAV-mounted amplify-and-forward relay in the presence of a ...
Milad Tatar Mamaghani, Yi Hong
doaj   +1 more source

Downlink Physical Layer Security Transmission Method Based on Zero-sum Game [PDF]

open access: yesJisuanji gongcheng, 2018
In the Multi-downlink network,the interference among nonorthogonal channels and the malicious interference makes destination nodes not meet the demand of Quality of Service(QoS).So a security transmission method based on zero-sum game model is proposed ...
XU Zhaoye,LU Ruimin
doaj   +1 more source

Simultaneous Wireless Information and Power Transfer in Multi-User OFDMA Networks with Physical Secrecy

open access: yesSensors, 2022
This paper considers simultaneous wireless information and power transfer (SWIPT) from a base station to multiple Internet of Things (IoT) nodes via orthogonal frequency-division multiple access (OFDMA), where every node can eavesdrop on the subcarriers ...
Pubet Sangmahamad   +2 more
doaj   +1 more source

Secure Communications in Millimeter Wave Ad Hoc Networks [PDF]

open access: yes, 2017
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential ...
Heath Jr, Robert W.   +3 more
core   +2 more sources

Antenna selection algorithm based on cut-off rate for secure spatial modulation with finite alphabet input

open access: yesTongxin xuebao, 2020
For the security transmission of artificial noise with finite alphabet inputs in secure spatial modulation system,an antenna selection algorithm based on cut-off rate (COR) was proposed.Considering that it was difficult to obtain the closed-form ...
Qingfeng DING   +3 more
doaj   +2 more sources

Mobile jammers for secrecy rate maximization in cooperative networks [PDF]

open access: yes2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013
We consider a source (Alice) trying to communicate with a destination (Bob), in a way that an unauthorized node (Eve) cannot infer, based on her observations, the information that is being transmitted. The communication is assisted by multiple multi-antenna cooperating nodes (helpers) who have the ability to move.
Kalogerias, Dionysios S.   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy