Results 11 to 20 of about 560,014 (299)
Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel [PDF]
Unmanned aerial vehicles (UAVs) are capable of improving the performance of next generation wireless systems. However, their communication performance is prone to both channel estimation errors and potential eavesdropping.
Hamed Bastami +5 more
semanticscholar +1 more source
Multi-Antenna Jammer-Assisted Secure Short Packet Communications in IoT Networks
In this work, we exploit a multi-antenna cooperative jammer to enable secure short packet communications in Internet of Things (IoT) networks. Specifically, we propose three jamming schemes to combat eavesdropping, i.e., the zero forcing beamforming (ZFB)
Dechuan Chen +4 more
doaj +1 more source
Secure short-packet communications using a full-duplex receiver
In this work, we consider the physical layer security in short-packet communications, where a full-duplex (FD) receiver receives information signals from a source while generating artificial noise (AN) to confuse an eavesdropper.
Dechuan Chen +4 more
doaj +1 more source
Throughput maximization in multi-hop wireless networks under a secrecy constraint [PDF]
This paper analyzes the throughput of industrial communication networks under a secrecy constraint. The proposed scenario is composed by sensors that measure some relevant information of the plant that is first processed by aggregator node and then sent to the control unit.
Alves Hirley +3 more
openaire +3 more sources
The underlay cognitive radio-based hybrid radio frequency/free-space optical (RF/FSO) systems have emerged as a promising technology due to their ability to eliminate spectrum scarcity and spectrum under-utilization problems.
M. Ibrahim +5 more
semanticscholar +1 more source
Artificial Noise Injection–Based Secrecy Improvement for FSO Systems
In this paper, an artificial noise (AN) injection technique is incorporated in a free-space optical (FSO) communication system with the aim of enhancing the secrecy performance of the system. An intensity modulated direct detection (IM/DD) FSO link which
Aman Sikri +5 more
doaj +1 more source
This paper investigates the physical layer security of in-home and broadband power line communications (PLC) systems threatened by colluding wireless communication (WLC) eavesdroppers, which are localized near or far from the transmitter and operate in ...
Ândrei Camponogara +2 more
semanticscholar +1 more source
This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and power transfer cooperative relay network in the presence of an eavesdropper.
Isabella Wanderley Gomes Da Silva +3 more
doaj +1 more source
Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networks
This paper considers secure communication in buffer-aided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes.
Jiayu Zhou, Deli Qiao, Haifeng Qian
doaj +1 more source
Optimal Channel Training Design for Secure Short-Packet Communications
Physical layer security is a promising technique to ensure the confidentiality of short-packet communications, since no additional channel uses are needed.
Dechuan Chen +4 more
doaj +1 more source

