Results 241 to 250 of about 560,014 (299)
Some of the next articles are maybe not open access.

Secrecy Throughput Maximization for RIS-Assisted FBL Massive MIMO Systems

IEEE Wireless Communications Letters
This letter investigates the physical security of reconfigurable intelligent surface (RIS) aided massive multi-input multi-output (MIMO) downlink eavesdropping system for multi-users with finite blocklength (FBL).
Wei Zhao   +3 more
openaire   +2 more sources

Secrecy Throughput Enhancement with ANECE and Multi-Antenna Beamforming in Finite Blocklength

ICC 2022 - IEEE International Conference on Communications, 2022
This paper presents a secure downlink communication system where a transmitter with multiple antennas sends information to multiple single antenna users under ultra reliable and low-latency communication (uRLLC) system requirement.
Ishmam Zabir   +2 more
openaire   +2 more sources

Minimum Secrecy Throughput Maximization in Wireless Powered Secure Communications

IEEE Transactions on Vehicular Technology, 2018
This paper investigates a wireless powered secure communication network (WPSCN), in which the legitimate users have no constant energy supply and need to be wireless powered for information transmitting. The harvest-then-transmit protocol is adopted in the WPSCN, i.e., the energy access point (EAP) first transfers energy to legitimate users through ...
Chongtao Guo   +4 more
openaire   +2 more sources

Exact Secrecy Throughput of MANETs with Guard Zone

2016 International Conference on Networking and Network Applications (NaNA), 2016
Different from previous works that mainly focus on deriving the scaling results for secrecy throughput of mobile ad hoc networks (MANETs), this paper studies the exact secrecy throughput of a cell-partitioned MANET with groupbased scheduling to eliminate interference from simultaneous transmissions.
Xiaochen Li   +4 more
openaire   +2 more sources

Outage Constrained Secrecy Throughput Maximization for DF Relay Networks

IEEE Transactions on Communications, 2015
In this paper, we provide a comprehensive study of secrecy transmission in decode-and-forward (DF) relay networks subjected to slow fading. With only channel distribution information (CDI) of the wiretap channels, we aim at maximizing secrecy throughput of the two-hop transmission under a secrecy outage constraint through optimizing transmission region,
Tong-Xing Zheng   +3 more
openaire   +2 more sources

Secrecy Throughput Analysis of Energy Scavenging Overlay Networks with Artificial Noise

2020 International Conference on Advanced Technologies for Communications (ATC), 2020
Energy scavenging overlay networks with artificial noise (ESONwAN) integrate three emerging (energy harvesting, cognitive radio, physical layer security) technologies to boost spectrum utilization efficiency, energy efficiency, and message security, which sufficiently provide secured communication demands of an immense number of users in modern ...
Ngoc Pham-Thi-Dan   +7 more
openaire   +2 more sources

Secrecy Throughput Maximization for Full-Duplex Wireless Powered Communication Networks

ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019
In this paper, we investigate the secrecy throughput for a full-duplex wireless powered communication network. A multi-antenna base station (BS) transmits energy towards nodes all the time and each node harvests energy prior to its transmission time slot.
Roohollah Rezaei   +4 more
openaire   +2 more sources

Secrecy Throughput Maximization for Massive MIMO Wireless Powered Communication Networks

2019 IEEE Global Communications Conference (GLOBECOM), 2019
In this paper, we study the secrecy throughput in a massive Multiple-Input-Multiple-Output (MIMO) full-duplex wireless powered communication network (WPCN). The network consists of a massive MIMO base station (BS) and two groups of single- antenna sensor nodes which harvest energy from the BS.
Roohollah Rezaei   +4 more
openaire   +2 more sources

Exact secrecy throughput capacity study in mobile ad hoc networks

Ad Hoc Networks, 2018
Abstract The secrecy throughput capacity (STC) performance study of mobile ad hoc networks (MANETs) is critical for supporting their applications in security-sensitive scenarios. Despite much work on the scaling law results of MANET STC, the exact STC study of such networks remains an open problem.
Xiaochen Li   +4 more
openaire   +2 more sources

Average Secrecy Throughput Analysis with Multiple Eavesdroppers in the Finite Blocklength

2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, 2020
This paper studies the problem of secure communication from a transmitter to a receiver with the use of short packets under the existence of multiple eavesdroppers, who are overhearing the transmission. We assume that the eavesdroppers are mutually independent.
Nihan Ari   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy