Results 231 to 240 of about 9,853 (272)
Some of the next articles are maybe not open access.

Optimal secrecy throughput and efficient energy harvesting for SWIPT system

2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2018
In recent years, simultaneous wireless information and power transfer (SWIPT) has attracted people's research interest, but many researchers only consider one of the secrecy throughput and harvested energy. In this paper, we optimize the secrecy throughput and improve the utilization of the harvested energy in a certain way with a based beamforming ...
Lixin Li, Ang Gao
exaly   +2 more sources

On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ

IEEE Communications Letters, 2014
This work has studied the physical layer security in cooperative automatic-repeat-request (CARQ), under the assumption of no instantaneous channel state information (CSI) at legitimate users. Different from present works, this paper not only derives closed form expressions for connection outage probability (COP) and secrecy outage probability (SOP) to ...
Yueming Cai, Weiwei Yang
exaly   +2 more sources

Generalized delay-secrecy-throughput trade-offs in mobile ad-hoc networks

2011 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications, 2011
In this paper, we first present a theoretical framework aimed at generalizing the scaling laws of delay, secrecy and throughput in mobile ad-hoc networks for various network models and scheduling policies available in the literature. We derive new scaling laws for throughput-delay trade-offs for routing policies such as Spray-and-Wait. A model based on
Joäo Ao Barros
exaly   +3 more sources

Transmission Policies for Improving Physical Layer Secrecy Throughput in Wireless Networks

IEEE Communications Letters, 2012
In this letter, we analyze the physical layer secrecy throughput in wireless fading networks with independent eavesdroppers that do not collude. We study the impacts of the total number of eavesdroppers on the secrecy throughput. In addition, we propose two channel-adaptive transmission policies for improving the secrecy throughput.
exaly   +2 more sources

On secrecy throughput optimization of a DF relay network subjected to slow fading

2014 IEEE Globecom Workshops (GC Wkshps), 2014
This paper investigates the parameter design for the secrecy throughput optimization under a secrecy outage constraint in a DF relay network subjected to fading. The parameters are designed based on the statistical channel state information (SCSI) of the legitimate channel.
Tong-Xing Zheng, Hui-Ming Wang
exaly   +2 more sources

Active Eavesdropping in Short Packet Communication: Average Secrecy Throughput Analysis

2021 IEEE International Conference on Communications Workshops (ICC Workshops), 2021
In this paper, we investigate secure short packet transmission from a legitimate transmitter to a receiver in the presence of an active eavesdropper. The aim is to gain more insights into how an active eavesdropper affects the secrecy throughput of short packet communications.
Nihan Ari   +2 more
openaire   +1 more source

Secrecy Rate Pair Constraints for Secure Throughput

2014 IEEE Military Communications Conference, 2014
Physical layer security, which is an alternative to traditional cryptographic methods, has emerged as a promising candidate to protect wireless transmissions from an eavesdropper. An important measure of physical layer security is the secrecy outage: the event when the instantaneous secrecy capacity, which for the considered scenario is the difference ...
Kyle Morrison, Dennis Goeckel
openaire   +1 more source

Secrecy throughput of MANETs with malicious nodes

2009 IEEE International Symposium on Information Theory, 2009
The secrecy throughput of mobile ad-hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D. An information theoretic approach for security is applied to achieve secure communication among legitimate ...
Yingbin Liang, H. Vincent Poor, Lei Ying
openaire   +1 more source

Secrecy Throughput of MANETs Under Passive and Active Attacks

IEEE Transactions on Information Theory, 2011
The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D. A model under passive attack is first studied, in which the malicious nodes are assumed to be eavesdroppers ...
Yingbin Liang, H. Vincent Poor, Lei Ying
openaire   +1 more source

Throughput and energy efficiency under queueing and secrecy constraints

2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), 2012
A broadcast model in which the transmitter sends confidential and common messages to two receivers is considered. It is assumed that the common and confidential data is stored in buffers prior to transmission and the transmitter operates under constraints on buffer violation probability.
Mustafa Ozmen, M. Cenk Gursoy
openaire   +1 more source

Home - About - Disclaimer - Privacy