Results 241 to 250 of about 9,853 (272)
Some of the next articles are maybe not open access.

Minimum Secrecy Throughput Maximization in Wireless Powered Secure Communications

IEEE Transactions on Vehicular Technology, 2018
This paper investigates a wireless powered secure communication network (WPSCN), in which the legitimate users have no constant energy supply and need to be wireless powered for information transmitting. The harvest-then-transmit protocol is adopted in the WPSCN, i.e., the energy access point (EAP) first transfers energy to legitimate users through ...
Chongtao Guo   +4 more
openaire   +1 more source

Throughput maximization in multiantenna OFDMA downlink under secrecy rate constraints

2014 IEEE Wireless Communications and Networking Conference (WCNC), 2014
This paper deals with the problem of sum rate maximization for a multiuser orthogonal frequency-division multiple access channel with secrecy rate constraints. We consider the case of a multiple-antenna base station (BS) and several single-antenna downlink receivers; a single secure user, a single eavesdropper and several normal users (without secrecy ...
Karachontzitis, S.   +5 more
openaire   +2 more sources

Secrecy throughput maximization for millimeter wave systems with artificial noise

2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016
In this paper, we study the secrecy throughput in millimeter wave systems under slow fading channels considering multipath propagation. For the specific propagation characteristics of millimeter wave, we provide transmission scheme designs and a comprehensive secrecy performance analysis. Specifically, we maximize the secrecy throughput under a secrecy
Ying Ju   +5 more
openaire   +1 more source

Secrecy-throughput-optimal artificial noise design against randomly located eavesdroppers

2016 International Conference on Computing, Networking and Communications (ICNC), 2016
This paper investigates the parameter design and optimization on the artificial-noise-aided multi-antenna transmission in the presence of randomly located eavesdroppers. Our objective is to maximize the secrecy throughput subject to a secrecy outage constraint.
Tong-Xing Zheng   +3 more
openaire   +1 more source

Secrecy Throughput Maximization for Full-Duplex Wireless Powered Communication Networks

ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019
In this paper, we investigate the secrecy throughput for a full-duplex wireless powered communication network. A multi-antenna base station (BS) transmits energy towards nodes all the time and each node harvests energy prior to its transmission time slot.
Roohollah Rezaei   +4 more
openaire   +1 more source

Secrecy Throughput Maximization for Massive MIMO Wireless Powered Communication Networks

2019 IEEE Global Communications Conference (GLOBECOM), 2019
In this paper, we study the secrecy throughput in a massive Multiple-Input-Multiple-Output (MIMO) full-duplex wireless powered communication network (WPCN). The network consists of a massive MIMO base station (BS) and two groups of single- antenna sensor nodes which harvest energy from the BS.
Roohollah Rezaei   +4 more
openaire   +1 more source

Secrecy Throughput Analysis of Energy Scavenging Overlay Networks with Artificial Noise

2020 International Conference on Advanced Technologies for Communications (ATC), 2020
Energy scavenging overlay networks with artificial noise (ESONwAN) integrate three emerging (energy harvesting, cognitive radio, physical layer security) technologies to boost spectrum utilization efficiency, energy efficiency, and message security, which sufficiently provide secured communication demands of an immense number of users in modern ...
Ngoc Pham-Thi-Dan   +7 more
openaire   +1 more source

Average Secrecy Throughput Analysis with Multiple Eavesdroppers in the Finite Blocklength

2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, 2020
This paper studies the problem of secure communication from a transmitter to a receiver with the use of short packets under the existence of multiple eavesdroppers, who are overhearing the transmission. We assume that the eavesdroppers are mutually independent.
Nihan Ari   +2 more
openaire   +1 more source

Effective secrecy throughput analysis of relay-assisted free-space optical communications

Physical Communication, 2019
Abstract We evaluate the effective secrecy throughput (EST) of multiple-input-multiple-output relay-assisted free-space optical communication, where legitimate nodes (Alice, Relays, and Bob) communicate in the presence of multiple Eavesdroppers (Eves) under two different weather conditions, namely clear weather with weak turbulence and light fog with
Marcos Eduardo Pivaro Monteiro   +3 more
openaire   +1 more source

Secrecy Throughput of Wireless Interference Networks with Uncertain Channel State Information

2017 IEEE Globecom Workshops (GC Wkshps), 2017
Considering a multi-user interference network with an eavesdropper, this paper investigates the problem of power allocation to optimize the worst secrecy throughput among the network links. Three scenarios for the access of channel state information are considered: perfect channel state information, partial channel state information with channels from ...
Z. Sheng   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy