Results 1 to 10 of about 560,014 (299)

Secrecy Throughput Maximization for Full-Duplex Wireless Powered IoT Networks under Fairness Constraints [PDF]

open access: yesIEEE Internet of Things Journal, 2019
In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for internet of things (IoT). The WPCN consists of a full-duplex multi-antenna base station (BS) and a number of sensor nodes.
Fellow   +12 more
core   +5 more sources

Secrecy Throughput Optimization for the WPCNs With Non-Linear EH Model [PDF]

open access: yesIEEE Access, 2019
This paper investigates secure communication from a wireless-powered transmitter to a desired receiver with multiple eavesdroppers in the wireless powered communication networks (WPCNs). Considering the non-linear energy harvesting (EH) model, we propose
Xiaochen Liu   +3 more
doaj   +3 more sources

Novel Noise Injection Scheme to Guarantee Zero Secrecy Outage under Imperfect CSI [PDF]

open access: yesEntropy, 2023
The paper proposes a novel artificial noise (AN) injection strategy in multiple-input single-output multiple-antenna-eavesdropper (MISOME) systems under imperfect channel estimation at the legitimate channel to achieve zero secrecy outage probability ...
Hien Q. Ta, Lam Cao, Hoon Oh
doaj   +2 more sources

Secrecy Throughput in Full-Duplex Multiuser MIMO Short-Packet Communications [PDF]

open access: yesIEEE Wireless Communications Letters, 2021
In this letter, we consider the physical-layer security (PLS) in full-duplex (FD) multiuser multiple-input-multiple-output (MIMO) short-packet communications, where a base station (BS) transmits precoded signals for secure downlink multicast while receiving signals from uplink users.
Lai Wei, Yuli Yang, Bingli Jiao
openaire   +2 more sources

Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2018
to appear in IEEE Transactions on Wireless ...
Marcos Eduardo Pivaro Monteiro   +3 more
openaire   +4 more sources

Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic

open access: yesInternational Journal of Distributed Sensor Networks, 2014
We investigate the secrecy throughput of inhomogeneous wireless network, especially in cases of independent and uniform eavesdropper with single antenna and multiple antennas.
Qiuming Liu, Li Yu, Peng Yang, Zuhao Liu
doaj   +2 more sources

Secrecy Throughput of ANECE Assisted Transmission of Information in Finite Blocklength

open access: yes2022 IEEE Wireless Communications and Networking Conference (WCNC), 2022
Anti-eavesdropping channel estimation (ANECE) among two or more cooperative full-duplex radio devices allows these devices to obtain consistent estimates of their receive channel state information (CSI) with respect to each other but at the same time ...
Zabir, Ishmam   +2 more
openaire   +4 more sources

Exploiting Uplink NOMA to Improve Sum Secrecy Throughput in IoT Networks

open access: yesWireless Communications and Mobile Computing, 2018
This paper exploits nonorthogonal multiple access (NOMA) to enhance the uplink secure transmission in Internet of Things (IoT) networks. Considering the different intercept ability of eavesdroppers (Eve), secrecy performances of both strong and weak Eve wiretap scenarios have been investigated. In strong Eve wiretap scenario (SWS), Eve is assumed to be
Zhongwu Xiang   +5 more
openaire   +2 more sources

Long-Term Secrecy Throughput and Fairness Tradeoff for Wireless Powered Secure IoT Networks

open access: yesIEEE Open Journal of the Communications Society
This paper focuses on the interplay between secrecy throughput and fairness for a wireless powered secure Internet of Things (IoT) network, where IoT devices harvest energy from an access point (AP), and securely upload their data to the AP by exploiting
Lei Zheng   +4 more
doaj   +2 more sources

Effective secrecy throughput optimization for GTLS-based UWOC systems with eavesdropper outage constraint

open access: yesOptics Express
In this work, the effective secrecy throughput (EST) which explicitly captures both the reliability and secrecy features of wiretap channels for an underwater wireless optical communication (UWOC) system has been optimized by considering the generalized transmit laser selection (GTLS) scheme.
Binna, Zhou   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy