Results 11 to 20 of about 9,853 (272)
This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and power transfer cooperative relay network in the presence of an eavesdropper.
Isabella Wanderley Gomes Da Silva +3 more
doaj +1 more source
Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networks
This paper considers secure communication in buffer-aided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes.
Jiayu Zhou, Deli Qiao, Haifeng Qian
doaj +1 more source
Optimal Channel Training Design for Secure Short-Packet Communications
Physical layer security is a promising technique to ensure the confidentiality of short-packet communications, since no additional channel uses are needed.
Dechuan Chen +4 more
doaj +1 more source
Secure User Association in Two-Tier Heterogeneous Cellular Networks With In-Band Interference
In this paper, we address the issue of security-concerned user association in two-tier heterogeneous cellular networks with in-band interference. Different from the maximum secrecy capacity association (max-SC), which studied multi-tier heterogeneous ...
Shijie Wang +4 more
doaj +1 more source
Secure Transmission for Relay Wiretap Channels in the Presence of Spatially Random Eavesdroppers [PDF]
We propose a secure transmission scheme for a relay wiretap channel, where a source communicates with a destination via a decode-and-forward relay in the presence of spatially random-distributed eavesdroppers.
Liu, Chenxi +3 more
core +2 more sources
Optical HAPS Eavesdropping in Vertical Heterogeneous Networks
In the next generation (6G) wireless networks, the integration of terrestrial and non-terrestrial networks is essential to provide flawless connectivity over the globe.
Eylem Erdogan +3 more
doaj +1 more source
Enhancing wireless security via optimal cooperative jamming [PDF]
In this work, we analyze the secrecy rate in a cooperative network, where a source node is assisted by relay nodes via cooperative jamming for delivering a secret message to the destination in the presence of an eavesdropper node.
Gurbuz, Ozgur +3 more
core +1 more source
Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages
Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link ...
Yi Song +4 more
doaj +1 more source
Impact of Heterogeneity and Secrecy on theCapacity of Wireless Sensor Networks
This paper investigates the achievable secrecy throughput of an inhomogeneous wireless sensor network. We consider the impact of topology heterogeneity and the secrecy constraint on the throughput. For the topology heterogeneity, by virtue of percolation
Qiuming Liu, Li Yu, Zuhao Liu, Jun Zheng
doaj +1 more source
Security–reliability tradeoff analysis of untrusted energy harvesting relay networks
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen +4 more
doaj +1 more source

