Minimum Secrecy Throughput Maximization in Wireless Powered Secure Communications
IEEE Transactions on Vehicular Technology, 2018This paper investigates a wireless powered secure communication network (WPSCN), in which the legitimate users have no constant energy supply and need to be wireless powered for information transmitting. The harvest-then-transmit protocol is adopted in the WPSCN, i.e., the energy access point (EAP) first transfers energy to legitimate users through ...
Chongtao Guo +4 more
openaire +1 more source
Throughput maximization in multiantenna OFDMA downlink under secrecy rate constraints
2014 IEEE Wireless Communications and Networking Conference (WCNC), 2014This paper deals with the problem of sum rate maximization for a multiuser orthogonal frequency-division multiple access channel with secrecy rate constraints. We consider the case of a multiple-antenna base station (BS) and several single-antenna downlink receivers; a single secure user, a single eavesdropper and several normal users (without secrecy ...
Karachontzitis, S. +5 more
openaire +2 more sources
Secrecy throughput maximization for millimeter wave systems with artificial noise
2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016In this paper, we study the secrecy throughput in millimeter wave systems under slow fading channels considering multipath propagation. For the specific propagation characteristics of millimeter wave, we provide transmission scheme designs and a comprehensive secrecy performance analysis. Specifically, we maximize the secrecy throughput under a secrecy
Ying Ju +5 more
openaire +1 more source
Secrecy-throughput-optimal artificial noise design against randomly located eavesdroppers
2016 International Conference on Computing, Networking and Communications (ICNC), 2016This paper investigates the parameter design and optimization on the artificial-noise-aided multi-antenna transmission in the presence of randomly located eavesdroppers. Our objective is to maximize the secrecy throughput subject to a secrecy outage constraint.
Tong-Xing Zheng +3 more
openaire +1 more source
Secrecy Throughput Maximization for Full-Duplex Wireless Powered Communication Networks
ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019In this paper, we investigate the secrecy throughput for a full-duplex wireless powered communication network. A multi-antenna base station (BS) transmits energy towards nodes all the time and each node harvests energy prior to its transmission time slot.
Roohollah Rezaei +4 more
openaire +1 more source
Secrecy Throughput Maximization for Massive MIMO Wireless Powered Communication Networks
2019 IEEE Global Communications Conference (GLOBECOM), 2019In this paper, we study the secrecy throughput in a massive Multiple-Input-Multiple-Output (MIMO) full-duplex wireless powered communication network (WPCN). The network consists of a massive MIMO base station (BS) and two groups of single- antenna sensor nodes which harvest energy from the BS.
Roohollah Rezaei +4 more
openaire +1 more source
Secrecy Throughput Analysis of Energy Scavenging Overlay Networks with Artificial Noise
2020 International Conference on Advanced Technologies for Communications (ATC), 2020Energy scavenging overlay networks with artificial noise (ESONwAN) integrate three emerging (energy harvesting, cognitive radio, physical layer security) technologies to boost spectrum utilization efficiency, energy efficiency, and message security, which sufficiently provide secured communication demands of an immense number of users in modern ...
Ngoc Pham-Thi-Dan +7 more
openaire +1 more source
Average Secrecy Throughput Analysis with Multiple Eavesdroppers in the Finite Blocklength
2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, 2020This paper studies the problem of secure communication from a transmitter to a receiver with the use of short packets under the existence of multiple eavesdroppers, who are overhearing the transmission. We assume that the eavesdroppers are mutually independent.
Nihan Ari +2 more
openaire +1 more source
Effective secrecy throughput analysis of relay-assisted free-space optical communications
Physical Communication, 2019Abstract We evaluate the effective secrecy throughput (EST) of multiple-input-multiple-output relay-assisted free-space optical communication, where legitimate nodes (Alice, Relays, and Bob) communicate in the presence of multiple Eavesdroppers (Eves) under two different weather conditions, namely clear weather with weak turbulence and light fog with
Marcos Eduardo Pivaro Monteiro +3 more
openaire +1 more source
Secrecy Throughput of Wireless Interference Networks with Uncertain Channel State Information
2017 IEEE Globecom Workshops (GC Wkshps), 2017Considering a multi-user interference network with an eavesdropper, this paper investigates the problem of power allocation to optimize the worst secrecy throughput among the network links. Three scenarios for the access of channel state information are considered: perfect channel state information, partial channel state information with channels from ...
Z. Sheng +3 more
openaire +1 more source

