Results 11 to 20 of about 9,853 (272)

Impact of Self-Energy Recycling and Cooperative Jamming on SWIPT-Based FD Relay Networks With Secrecy Constraints

open access: yesIEEE Access, 2022
This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and power transfer cooperative relay network in the presence of an eavesdropper.
Isabella Wanderley Gomes Da Silva   +3 more
doaj   +1 more source

Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
This paper considers secure communication in buffer-aided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes.
Jiayu Zhou, Deli Qiao, Haifeng Qian
doaj   +1 more source

Optimal Channel Training Design for Secure Short-Packet Communications

open access: yesSensors, 2023
Physical layer security is a promising technique to ensure the confidentiality of short-packet communications, since no additional channel uses are needed.
Dechuan Chen   +4 more
doaj   +1 more source

Secure User Association in Two-Tier Heterogeneous Cellular Networks With In-Band Interference

open access: yesIEEE Access, 2018
In this paper, we address the issue of security-concerned user association in two-tier heterogeneous cellular networks with in-band interference. Different from the maximum secrecy capacity association (max-SC), which studied multi-tier heterogeneous ...
Shijie Wang   +4 more
doaj   +1 more source

Secure Transmission for Relay Wiretap Channels in the Presence of Spatially Random Eavesdroppers [PDF]

open access: yes, 2015
We propose a secure transmission scheme for a relay wiretap channel, where a source communicates with a destination via a decode-and-forward relay in the presence of spatially random-distributed eavesdroppers.
Liu, Chenxi   +3 more
core   +2 more sources

Optical HAPS Eavesdropping in Vertical Heterogeneous Networks

open access: yesIEEE Open Journal of Vehicular Technology, 2023
In the next generation (6G) wireless networks, the integration of terrestrial and non-terrestrial networks is essential to provide flawless connectivity over the globe.
Eylem Erdogan   +3 more
doaj   +1 more source

Enhancing wireless security via optimal cooperative jamming [PDF]

open access: yes, 2012
In this work, we analyze the secrecy rate in a cooperative network, where a source node is assisted by relay nodes via cooperative jamming for delivering a secret message to the destination in the presence of an eavesdropper node.
Gurbuz, Ozgur   +3 more
core   +1 more source

Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages

open access: yesEntropy, 2019
Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link ...
Yi Song   +4 more
doaj   +1 more source

Impact of Heterogeneity and Secrecy on theCapacity of Wireless Sensor Networks

open access: yesSensors, 2015
This paper investigates the achievable secrecy throughput of an inhomogeneous wireless sensor network. We consider the impact of topology heterogeneity and the secrecy constraint on the throughput. For the topology heterogeneity, by virtue of percolation
Qiuming Liu, Li Yu, Zuhao Liu, Jun Zheng
doaj   +1 more source

Security–reliability tradeoff analysis of untrusted energy harvesting relay networks

open access: yesInternational Journal of Distributed Sensor Networks, 2018
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy