Results 31 to 40 of about 139,119 (288)
PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL [PDF]
The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical ...
Vaibhav Kumar Gupta, Poonam Jindal
doaj
Jamming-Aided Secrecy Performance in Secure Uplink NOMA System
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work.
Kaiwei Jiang, Weihua Zhou, Lingjie Sun
doaj +1 more source
Enhancing wireless security via optimal cooperative jamming [PDF]
In this work, we analyze the secrecy rate in a cooperative network, where a source node is assisted by relay nodes via cooperative jamming for delivering a secret message to the destination in the presence of an eavesdropper node.
Gurbuz, Ozgur +3 more
core +1 more source
Monetary policy, secrecy, and federal funds rate behavior [PDF]
Abstract The behavior of the Federal Reserve System can be characterized as secretive. One common justification for this secrecy is the financial markets will overreact to information, causing undue variability in interest rates. This paper examines the credibility of this assertion under the post-October 1979 non-borrowed reserves operating ...
openaire +2 more sources
On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying With Cooperative Jamming and SWIPT
This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission protocol, where a source sends confidential information to a destination via an energy-constrained UAV-mounted amplify-and-forward relay in the presence of a ...
Milad Tatar Mamaghani, Yi Hong
doaj +1 more source
Downlink Physical Layer Security Transmission Method Based on Zero-sum Game [PDF]
In the Multi-downlink network,the interference among nonorthogonal channels and the malicious interference makes destination nodes not meet the demand of Quality of Service(QoS).So a security transmission method based on zero-sum game model is proposed ...
XU Zhaoye,LU Ruimin
doaj +1 more source
This paper considers simultaneous wireless information and power transfer (SWIPT) from a base station to multiple Internet of Things (IoT) nodes via orthogonal frequency-division multiple access (OFDMA), where every node can eavesdrop on the subcarriers ...
Pubet Sangmahamad +2 more
doaj +1 more source
Secure Communications in Millimeter Wave Ad Hoc Networks [PDF]
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential ...
Heath Jr, Robert W. +3 more
core +2 more sources
For the security transmission of artificial noise with finite alphabet inputs in secure spatial modulation system,an antenna selection algorithm based on cut-off rate (COR) was proposed.Considering that it was difficult to obtain the closed-form ...
Qingfeng DING +3 more
doaj +2 more sources
Mobile jammers for secrecy rate maximization in cooperative networks [PDF]
We consider a source (Alice) trying to communicate with a destination (Bob), in a way that an unauthorized node (Eve) cannot infer, based on her observations, the information that is being transmitted. The communication is assisted by multiple multi-antenna cooperating nodes (helpers) who have the ability to move.
Kalogerias, Dionysios S. +3 more
openaire +2 more sources

