Towards Tamper-Proof Trust Evaluation of Internet of Things Nodes Leveraging IOTA Ledger. [PDF]
Akli A, Chougdali K.
europepmc +1 more source
Related searches:
Effective Secrecy Throughput Analysis Over Underwater Wireless Optical Channel
2023 International Conference on Electrical, Computer and Communication Engineering (ECCE), 2023The advantages of physical layer security (PLS) have led researchers to apply this in various communication scenarios, such as radio frequency (RF) communication, free space optical (FSO) communication, and underwater optical wireless communication (UOWC)
Auntora Roy Chowdhury +2 more
openaire +2 more sources
Active Eavesdropping in Short Packet Communication: Average Secrecy Throughput Analysis
2021 IEEE International Conference on Communications Workshops (ICC Workshops), 2021In this paper, we investigate secure short packet transmission from a legitimate transmitter to a receiver in the presence of an active eavesdropper. The aim is to gain more insights into how an active eavesdropper affects the secrecy throughput of short packet communications.
Nihan Ari +2 more
openaire +2 more sources
Secrecy Throughput Maximization for IRS-Aided MIMO Wireless Powered Communication Networks
IEEE Transactions on Communications, 2022In this paper, we consider deploying an intelligent reflecting surface (IRS) to enhance the downlink (DL) energy transfer and uplink (UL) information transmission efficiency for secure multiple-input multiple-output (MIMO) wireless powered communication ...
Weiping Shi +4 more
openaire +2 more sources
Alternative Optimization for Secrecy Throughput Maximization in UAV-Aided NOMA Networks
IEEE Wireless Communications Letters, 2022With the rapid boost of wireless networks, it is challenging to guarantee the secure transmission and massive connectivity in the process of data collection.
Li Ping Qian +4 more
openaire +2 more sources
In this paper, we study the secrecy performance of RIS (Reconfigurable Intelligent Surface)-aided wireless communication system. We assume a wireless system with a source, legitimate user, RIS and a eavesdropper.
Sihui Shang, Pinyi Ren, Dongyang Xu
openaire +2 more sources
D2D Communications with Energy Harvesting: An Optimal Secrecy Throughput Perspective
2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)In this paper, a secure cognitive device-to-device (D2D) communications in cellular networks are considered, where the D2D transmitter (Alice) communicates with the D2D receiver (Bob) using the spectrum of the primary base station (BS).
Ajay Singh, Surjeet Kumar
openaire +2 more sources
Secrecy Throughput Optimization for DFRC System in Connected and Autonomous Vehicles Network
GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2023In this paper, we consider optimizing a multiple-input multiple-output (MIMO) dual-functional radar-communication (DFRC) transceiver at the roadside unit (RSU) to detect a potential eavesdropping target and transmit the private information securely to ...
Yu Yao +5 more
openaire +2 more sources
Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels
IEEE Transactions on Information Forensics and Security, 2017In this paper, the secure transmission strategy for a multi-input-single-output multi-eavesdropper system with coexistence of a secure user (Bob) and a normal user (NU) is investigated. The NU and Bob require normal and secure data transmissions, respectively, and thus, the stream for the NU can be exploited to confuse the eavesdroppers.
Wei Wang, Kah Chan Teh, Kwok Hung Li
openaire +2 more sources
Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay
2022 International Conference on Networking and Network Applications (NaNA), 2022In this paper, we investigate a fundamental issue of power control to provide secrecy transmission for a dual-hop satellite communication system consisting of a terrestrial station as the source, a terrestrial station as the destination, a satellite ...
Yeqiu Xiao +4 more
openaire +2 more sources

