Results 231 to 240 of about 9,853 (272)
Some of the next articles are maybe not open access.
Optimal secrecy throughput and efficient energy harvesting for SWIPT system
2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2018In recent years, simultaneous wireless information and power transfer (SWIPT) has attracted people's research interest, but many researchers only consider one of the secrecy throughput and harvested energy. In this paper, we optimize the secrecy throughput and improve the utilization of the harvested energy in a certain way with a based beamforming ...
Lixin Li, Ang Gao
exaly +2 more sources
On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ
IEEE Communications Letters, 2014This work has studied the physical layer security in cooperative automatic-repeat-request (CARQ), under the assumption of no instantaneous channel state information (CSI) at legitimate users. Different from present works, this paper not only derives closed form expressions for connection outage probability (COP) and secrecy outage probability (SOP) to ...
Yueming Cai, Weiwei Yang
exaly +2 more sources
Generalized delay-secrecy-throughput trade-offs in mobile ad-hoc networks
2011 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications, 2011In this paper, we first present a theoretical framework aimed at generalizing the scaling laws of delay, secrecy and throughput in mobile ad-hoc networks for various network models and scheduling policies available in the literature. We derive new scaling laws for throughput-delay trade-offs for routing policies such as Spray-and-Wait. A model based on
Joäo Ao Barros
exaly +3 more sources
Transmission Policies for Improving Physical Layer Secrecy Throughput in Wireless Networks
IEEE Communications Letters, 2012In this letter, we analyze the physical layer secrecy throughput in wireless fading networks with independent eavesdroppers that do not collude. We study the impacts of the total number of eavesdroppers on the secrecy throughput. In addition, we propose two channel-adaptive transmission policies for improving the secrecy throughput.
exaly +2 more sources
On secrecy throughput optimization of a DF relay network subjected to slow fading
2014 IEEE Globecom Workshops (GC Wkshps), 2014This paper investigates the parameter design for the secrecy throughput optimization under a secrecy outage constraint in a DF relay network subjected to fading. The parameters are designed based on the statistical channel state information (SCSI) of the legitimate channel.
Tong-Xing Zheng, Hui-Ming Wang
exaly +2 more sources
Active Eavesdropping in Short Packet Communication: Average Secrecy Throughput Analysis
2021 IEEE International Conference on Communications Workshops (ICC Workshops), 2021In this paper, we investigate secure short packet transmission from a legitimate transmitter to a receiver in the presence of an active eavesdropper. The aim is to gain more insights into how an active eavesdropper affects the secrecy throughput of short packet communications.
Nihan Ari +2 more
openaire +1 more source
Secrecy Rate Pair Constraints for Secure Throughput
2014 IEEE Military Communications Conference, 2014Physical layer security, which is an alternative to traditional cryptographic methods, has emerged as a promising candidate to protect wireless transmissions from an eavesdropper. An important measure of physical layer security is the secrecy outage: the event when the instantaneous secrecy capacity, which for the considered scenario is the difference ...
Kyle Morrison, Dennis Goeckel
openaire +1 more source
Secrecy throughput of MANETs with malicious nodes
2009 IEEE International Symposium on Information Theory, 2009The secrecy throughput of mobile ad-hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D. An information theoretic approach for security is applied to achieve secure communication among legitimate ...
Yingbin Liang, H. Vincent Poor, Lei Ying
openaire +1 more source
Secrecy Throughput of MANETs Under Passive and Active Attacks
IEEE Transactions on Information Theory, 2011The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D. A model under passive attack is first studied, in which the malicious nodes are assumed to be eavesdroppers ...
Yingbin Liang, H. Vincent Poor, Lei Ying
openaire +1 more source
Throughput and energy efficiency under queueing and secrecy constraints
2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), 2012A broadcast model in which the transmitter sends confidential and common messages to two receivers is considered. It is assumed that the common and confidential data is stored in buffers prior to transmission and the transmitter operates under constraints on buffer violation probability.
Mustafa Ozmen, M. Cenk Gursoy
openaire +1 more source

