Secrecy Throughput Maximization for RIS-Assisted FBL Massive MIMO Systems
IEEE Wireless Communications LettersThis letter investigates the physical security of reconfigurable intelligent surface (RIS) aided massive multi-input multi-output (MIMO) downlink eavesdropping system for multi-users with finite blocklength (FBL).
Wei Zhao +3 more
openaire +2 more sources
Secrecy Throughput Enhancement with ANECE and Multi-Antenna Beamforming in Finite Blocklength
ICC 2022 - IEEE International Conference on Communications, 2022This paper presents a secure downlink communication system where a transmitter with multiple antennas sends information to multiple single antenna users under ultra reliable and low-latency communication (uRLLC) system requirement.
Ishmam Zabir +2 more
openaire +2 more sources
Minimum Secrecy Throughput Maximization in Wireless Powered Secure Communications
IEEE Transactions on Vehicular Technology, 2018This paper investigates a wireless powered secure communication network (WPSCN), in which the legitimate users have no constant energy supply and need to be wireless powered for information transmitting. The harvest-then-transmit protocol is adopted in the WPSCN, i.e., the energy access point (EAP) first transfers energy to legitimate users through ...
Chongtao Guo +4 more
openaire +2 more sources
Exact Secrecy Throughput of MANETs with Guard Zone
2016 International Conference on Networking and Network Applications (NaNA), 2016Different from previous works that mainly focus on deriving the scaling results for secrecy throughput of mobile ad hoc networks (MANETs), this paper studies the exact secrecy throughput of a cell-partitioned MANET with groupbased scheduling to eliminate interference from simultaneous transmissions.
Xiaochen Li +4 more
openaire +2 more sources
Outage Constrained Secrecy Throughput Maximization for DF Relay Networks
IEEE Transactions on Communications, 2015In this paper, we provide a comprehensive study of secrecy transmission in decode-and-forward (DF) relay networks subjected to slow fading. With only channel distribution information (CDI) of the wiretap channels, we aim at maximizing secrecy throughput of the two-hop transmission under a secrecy outage constraint through optimizing transmission region,
Tong-Xing Zheng +3 more
openaire +2 more sources
Secrecy Throughput Analysis of Energy Scavenging Overlay Networks with Artificial Noise
2020 International Conference on Advanced Technologies for Communications (ATC), 2020Energy scavenging overlay networks with artificial noise (ESONwAN) integrate three emerging (energy harvesting, cognitive radio, physical layer security) technologies to boost spectrum utilization efficiency, energy efficiency, and message security, which sufficiently provide secured communication demands of an immense number of users in modern ...
Ngoc Pham-Thi-Dan +7 more
openaire +2 more sources
Secrecy Throughput Maximization for Full-Duplex Wireless Powered Communication Networks
ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019In this paper, we investigate the secrecy throughput for a full-duplex wireless powered communication network. A multi-antenna base station (BS) transmits energy towards nodes all the time and each node harvests energy prior to its transmission time slot.
Roohollah Rezaei +4 more
openaire +2 more sources
Secrecy Throughput Maximization for Massive MIMO Wireless Powered Communication Networks
2019 IEEE Global Communications Conference (GLOBECOM), 2019In this paper, we study the secrecy throughput in a massive Multiple-Input-Multiple-Output (MIMO) full-duplex wireless powered communication network (WPCN). The network consists of a massive MIMO base station (BS) and two groups of single- antenna sensor nodes which harvest energy from the BS.
Roohollah Rezaei +4 more
openaire +2 more sources
Exact secrecy throughput capacity study in mobile ad hoc networks
Ad Hoc Networks, 2018Abstract The secrecy throughput capacity (STC) performance study of mobile ad hoc networks (MANETs) is critical for supporting their applications in security-sensitive scenarios. Despite much work on the scaling law results of MANET STC, the exact STC study of such networks remains an open problem.
Xiaochen Li +4 more
openaire +2 more sources
Average Secrecy Throughput Analysis with Multiple Eavesdroppers in the Finite Blocklength
2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, 2020This paper studies the problem of secure communication from a transmitter to a receiver with the use of short packets under the existence of multiple eavesdroppers, who are overhearing the transmission. We assume that the eavesdroppers are mutually independent.
Nihan Ari +2 more
openaire +2 more sources

