Secrecy Throughput Maximization for Full-Duplex Wireless Powered IoT Networks Under Fairness Constraints [PDF]
In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for internet of things (IoT). The WPCN consists of a full-duplex multi-antenna base station (BS) and a number of sensor nodes.
Roohollah Rezaei, Sumei Sun, Xin Kang
exaly +5 more sources
Novel Noise Injection Scheme to Guarantee Zero Secrecy Outage under Imperfect CSI [PDF]
The paper proposes a novel artificial noise (AN) injection strategy in multiple-input single-output multiple-antenna-eavesdropper (MISOME) systems under imperfect channel estimation at the legitimate channel to achieve zero secrecy outage probability ...
Hien Q. Ta, Lam Cao, Hoon Oh
doaj +2 more sources
Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints [PDF]
to appear in IEEE Transactions on Wireless ...
Marcos Eduardo Pivaro Monteiro +2 more
exaly +3 more sources
Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic
We investigate the secrecy throughput of inhomogeneous wireless network, especially in cases of independent and uniform eavesdropper with single antenna and multiple antennas.
Qiuming Liu, Li Yu, Peng Yang, Zuhao Liu
doaj +2 more sources
Secrecy Throughput Optimization for the WPCNs With Non-Linear EH Model [PDF]
This paper investigates secure communication from a wireless-powered transmitter to a desired receiver with multiple eavesdroppers in the wireless powered communication networks (WPCNs). Considering the non-linear energy harvesting (EH) model, we propose
Xiaochen Liu +3 more
doaj +2 more sources
Multi-Antenna Jammer-Assisted Secure Short Packet Communications in IoT Networks
In this work, we exploit a multi-antenna cooperative jammer to enable secure short packet communications in Internet of Things (IoT) networks. Specifically, we propose three jamming schemes to combat eavesdropping, i.e., the zero forcing beamforming (ZFB)
Dechuan Chen +4 more
doaj +1 more source
Secrecy Throughput in Full-Duplex Multiuser MIMO Short-Packet Communications [PDF]
In this letter, we consider the physical-layer security (PLS) in full-duplex (FD) multiuser multiple-input-multiple-output (MIMO) short-packet communications, where a base station (BS) transmits precoded signals for secure downlink multicast while receiving signals from uplink users.
Lai Wei, Yuli Yang, Bingli Jiao
openaire +1 more source
Secure short-packet communications using a full-duplex receiver
In this work, we consider the physical layer security in short-packet communications, where a full-duplex (FD) receiver receives information signals from a source while generating artificial noise (AN) to confuse an eavesdropper.
Dechuan Chen +4 more
doaj +1 more source
Throughput maximization in multi-hop wireless networks under a secrecy constraint [PDF]
This paper analyzes the throughput of industrial communication networks under a secrecy constraint. The proposed scenario is composed by sensors that measure some relevant information of the plant that is first processed by aggregator node and then sent to the control unit.
Alves Hirley +3 more
openaire +3 more sources
Artificial Noise Injection–Based Secrecy Improvement for FSO Systems
In this paper, an artificial noise (AN) injection technique is incorporated in a free-space optical (FSO) communication system with the aim of enhancing the secrecy performance of the system. An intensity modulated direct detection (IM/DD) FSO link which
Aman Sikri +5 more
doaj +1 more source

