Secrecy Throughput Maximization for Full-Duplex Wireless Powered IoT Networks under Fairness Constraints [PDF]
In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for internet of things (IoT). The WPCN consists of a full-duplex multi-antenna base station (BS) and a number of sensor nodes.
Fellow +12 more
core +5 more sources
Secrecy Throughput Optimization for the WPCNs With Non-Linear EH Model [PDF]
This paper investigates secure communication from a wireless-powered transmitter to a desired receiver with multiple eavesdroppers in the wireless powered communication networks (WPCNs). Considering the non-linear energy harvesting (EH) model, we propose
Xiaochen Liu +3 more
doaj +3 more sources
Novel Noise Injection Scheme to Guarantee Zero Secrecy Outage under Imperfect CSI [PDF]
The paper proposes a novel artificial noise (AN) injection strategy in multiple-input single-output multiple-antenna-eavesdropper (MISOME) systems under imperfect channel estimation at the legitimate channel to achieve zero secrecy outage probability ...
Hien Q. Ta, Lam Cao, Hoon Oh
doaj +2 more sources
Secrecy Throughput in Full-Duplex Multiuser MIMO Short-Packet Communications [PDF]
In this letter, we consider the physical-layer security (PLS) in full-duplex (FD) multiuser multiple-input-multiple-output (MIMO) short-packet communications, where a base station (BS) transmits precoded signals for secure downlink multicast while receiving signals from uplink users.
Lai Wei, Yuli Yang, Bingli Jiao
openaire +2 more sources
Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints [PDF]
to appear in IEEE Transactions on Wireless ...
Marcos Eduardo Pivaro Monteiro +3 more
openaire +4 more sources
Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic
We investigate the secrecy throughput of inhomogeneous wireless network, especially in cases of independent and uniform eavesdropper with single antenna and multiple antennas.
Qiuming Liu, Li Yu, Peng Yang, Zuhao Liu
doaj +2 more sources
Secrecy Throughput of ANECE Assisted Transmission of Information in Finite Blocklength
Anti-eavesdropping channel estimation (ANECE) among two or more cooperative full-duplex radio devices allows these devices to obtain consistent estimates of their receive channel state information (CSI) with respect to each other but at the same time ...
Zabir, Ishmam +2 more
openaire +4 more sources
Exploiting Uplink NOMA to Improve Sum Secrecy Throughput in IoT Networks
This paper exploits nonorthogonal multiple access (NOMA) to enhance the uplink secure transmission in Internet of Things (IoT) networks. Considering the different intercept ability of eavesdroppers (Eve), secrecy performances of both strong and weak Eve wiretap scenarios have been investigated. In strong Eve wiretap scenario (SWS), Eve is assumed to be
Zhongwu Xiang +5 more
openaire +2 more sources
Long-Term Secrecy Throughput and Fairness Tradeoff for Wireless Powered Secure IoT Networks
This paper focuses on the interplay between secrecy throughput and fairness for a wireless powered secure Internet of Things (IoT) network, where IoT devices harvest energy from an access point (AP), and securely upload their data to the AP by exploiting
Lei Zheng +4 more
doaj +2 more sources
In this work, the effective secrecy throughput (EST) which explicitly captures both the reliability and secrecy features of wiretap channels for an underwater wireless optical communication (UWOC) system has been optimized by considering the generalized transmit laser selection (GTLS) scheme.
Binna, Zhou +4 more
openaire +3 more sources

