Wireless Power Transfer and Cooperative Jamming for Secrecy Throughput Maximization
IEEE Wireless Communications Letters, 2016This letter studies the secure communication between a wireless powered source node and a destination node in the presence of multiple eavesdroppers. We propose a hybrid base station (BS) scheme where the hybrid BS first transfers wireless power to the source and then performs cooperative jamming while the source transmits the information signal using ...
Ling Tang, Qianmu Li
openaire +2 more sources
Secrecy throughput maximization for millimeter wave systems with artificial noise
2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016In this paper, we study the secrecy throughput in millimeter wave systems under slow fading channels considering multipath propagation. For the specific propagation characteristics of millimeter wave, we provide transmission scheme designs and a comprehensive secrecy performance analysis. Specifically, we maximize the secrecy throughput under a secrecy
Ying Ju +5 more
openaire +2 more sources
Secrecy-throughput-optimal artificial noise design against randomly located eavesdroppers
2016 International Conference on Computing, Networking and Communications (ICNC), 2016This paper investigates the parameter design and optimization on the artificial-noise-aided multi-antenna transmission in the presence of randomly located eavesdroppers. Our objective is to maximize the secrecy throughput subject to a secrecy outage constraint.
Tong-Xing Zheng +3 more
openaire +2 more sources
Optimal secrecy throughput and efficient energy harvesting for SWIPT system
2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2018In recent years, simultaneous wireless information and power transfer (SWIPT) has attracted people's research interest, but many researchers only consider one of the secrecy throughput and harvested energy. In this paper, we optimize the secrecy throughput and improve the utilization of the harvested energy in a certain way with a based beamforming ...
Yatai Liu +4 more
openaire +2 more sources
Effective Secrecy Throughput Maximization for WPT Enabled IoT in the FBL Regime
2024 10th International Conference on Computer and Communications (ICCC)The inherent broadcast nature of wireless communication makes data transmissions vulnerable to eavesdropping, creating a critical need to balance communication reliability with security.
Ning Guo +5 more
openaire +2 more sources
Effective secrecy throughput analysis of relay-assisted free-space optical communications
Physical Communication, 2019Abstract We evaluate the effective secrecy throughput (EST) of multiple-input-multiple-output relay-assisted free-space optical communication, where legitimate nodes (Alice, Relays, and Bob) communicate in the presence of multiple Eavesdroppers (Eves) under two different weather conditions, namely clear weather with weak turbulence and light fog with
Marcos Eduardo Pivaro Monteiro +3 more
openaire +2 more sources
Secrecy Throughput of Wireless Interference Networks with Uncertain Channel State Information
2017 IEEE Globecom Workshops (GC Wkshps), 2017Considering a multi-user interference network with an eavesdropper, this paper investigates the problem of power allocation to optimize the worst secrecy throughput among the network links. Three scenarios for the access of channel state information are considered: perfect channel state information, partial channel state information with channels from ...
Z. Sheng +3 more
openaire +2 more sources
Maximum Secrecy Throughput of Transmit Antenna Selection with Eavesdropper Outage Constraints
IEEE Signal Processing Letters, 2015We evaluate the effective secrecy throughput of the multiple-input multiple-output multiple-antenna eavesdropper (MIMOME) wiretap channel with antenna selection at the legitimate transmitter. The optimal target secrecy rate that maximizes the effective secrecy throughput is obtained and confirmed by numerical results.
Marcos Eduardo Pivaro Monteiro +3 more
openaire +2 more sources
Secrecy Throughput Optimization in the Buffer-aided MIMO Full-Duplex Relaying System
2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2019In this paper, the physical layer security is studied in a buffer-aided MIMO relaying system, which consists of a source, a destination, a multi-antenna relay and multiple eavesdroppers. The relay operates in either half-duplex mode or full-duplex mode, based on the channel state information (CSI) of legitimate links.
Yue Zhao +3 more
openaire +2 more sources
We analyze the secrecy performance of a wireless system with limited feedback, where the channel state information (CSI) is imperfectly known at a multi-antenna source.
Tong Wu, Yulong Zou, Yuhan Jiang
semanticscholar +1 more source

