Results 251 to 260 of about 560,014 (299)
Some of the next articles are maybe not open access.

Wireless Power Transfer and Cooperative Jamming for Secrecy Throughput Maximization

IEEE Wireless Communications Letters, 2016
This letter studies the secure communication between a wireless powered source node and a destination node in the presence of multiple eavesdroppers. We propose a hybrid base station (BS) scheme where the hybrid BS first transfers wireless power to the source and then performs cooperative jamming while the source transmits the information signal using ...
Ling Tang, Qianmu Li
openaire   +2 more sources

Secrecy throughput maximization for millimeter wave systems with artificial noise

2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016
In this paper, we study the secrecy throughput in millimeter wave systems under slow fading channels considering multipath propagation. For the specific propagation characteristics of millimeter wave, we provide transmission scheme designs and a comprehensive secrecy performance analysis. Specifically, we maximize the secrecy throughput under a secrecy
Ying Ju   +5 more
openaire   +2 more sources

Secrecy-throughput-optimal artificial noise design against randomly located eavesdroppers

2016 International Conference on Computing, Networking and Communications (ICNC), 2016
This paper investigates the parameter design and optimization on the artificial-noise-aided multi-antenna transmission in the presence of randomly located eavesdroppers. Our objective is to maximize the secrecy throughput subject to a secrecy outage constraint.
Tong-Xing Zheng   +3 more
openaire   +2 more sources

Optimal secrecy throughput and efficient energy harvesting for SWIPT system

2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2018
In recent years, simultaneous wireless information and power transfer (SWIPT) has attracted people's research interest, but many researchers only consider one of the secrecy throughput and harvested energy. In this paper, we optimize the secrecy throughput and improve the utilization of the harvested energy in a certain way with a based beamforming ...
Yatai Liu   +4 more
openaire   +2 more sources

Effective Secrecy Throughput Maximization for WPT Enabled IoT in the FBL Regime

2024 10th International Conference on Computer and Communications (ICCC)
The inherent broadcast nature of wireless communication makes data transmissions vulnerable to eavesdropping, creating a critical need to balance communication reliability with security.
Ning Guo   +5 more
openaire   +2 more sources

Effective secrecy throughput analysis of relay-assisted free-space optical communications

Physical Communication, 2019
Abstract We evaluate the effective secrecy throughput (EST) of multiple-input-multiple-output relay-assisted free-space optical communication, where legitimate nodes (Alice, Relays, and Bob) communicate in the presence of multiple Eavesdroppers (Eves) under two different weather conditions, namely clear weather with weak turbulence and light fog with
Marcos Eduardo Pivaro Monteiro   +3 more
openaire   +2 more sources

Secrecy Throughput of Wireless Interference Networks with Uncertain Channel State Information

2017 IEEE Globecom Workshops (GC Wkshps), 2017
Considering a multi-user interference network with an eavesdropper, this paper investigates the problem of power allocation to optimize the worst secrecy throughput among the network links. Three scenarios for the access of channel state information are considered: perfect channel state information, partial channel state information with channels from ...
Z. Sheng   +3 more
openaire   +2 more sources

Maximum Secrecy Throughput of Transmit Antenna Selection with Eavesdropper Outage Constraints

IEEE Signal Processing Letters, 2015
We evaluate the effective secrecy throughput of the multiple-input multiple-output multiple-antenna eavesdropper (MIMOME) wiretap channel with antenna selection at the legitimate transmitter. The optimal target secrecy rate that maximizes the effective secrecy throughput is obtained and confirmed by numerical results.
Marcos Eduardo Pivaro Monteiro   +3 more
openaire   +2 more sources

Secrecy Throughput Optimization in the Buffer-aided MIMO Full-Duplex Relaying System

2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2019
In this paper, the physical layer security is studied in a buffer-aided MIMO relaying system, which consists of a source, a destination, a multi-antenna relay and multiple eavesdroppers. The relay operates in either half-duplex mode or full-duplex mode, based on the channel state information (CSI) of legitimate links.
Yue Zhao   +3 more
openaire   +2 more sources

Secrecy Throughput Optimization and Precoding Design in Adaptive Transmit Antenna Selection Systems With Limited Feedback

IEEE Transactions on Vehicular Technology, 2022
We analyze the secrecy performance of a wireless system with limited feedback, where the channel state information (CSI) is imperfectly known at a multi-antenna source.
Tong Wu, Yulong Zou, Yuhan Jiang
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy