Results 261 to 270 of about 560,014 (299)
Some of the next articles are maybe not open access.

Secrecy Rate Pair Constraints for Secure Throughput

2014 IEEE Military Communications Conference, 2014
Physical layer security, which is an alternative to traditional cryptographic methods, has emerged as a promising candidate to protect wireless transmissions from an eavesdropper. An important measure of physical layer security is the secrecy outage: the event when the instantaneous secrecy capacity, which for the considered scenario is the difference ...
Kyle Morrison, Dennis Goeckel
openaire   +1 more source

Secrecy throughput of MANETs with malicious nodes

2009 IEEE International Symposium on Information Theory, 2009
The secrecy throughput of mobile ad-hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D. An information theoretic approach for security is applied to achieve secure communication among legitimate ...
Yingbin Liang, H. Vincent Poor, Lei Ying
openaire   +1 more source

Secrecy Throughput of MANETs Under Passive and Active Attacks

IEEE Transactions on Information Theory, 2011
The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D. A model under passive attack is first studied, in which the malicious nodes are assumed to be eavesdroppers ...
Yingbin Liang, H. Vincent Poor, Lei Ying
openaire   +1 more source

Throughput and energy efficiency under queueing and secrecy constraints

2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), 2012
A broadcast model in which the transmitter sends confidential and common messages to two receivers is considered. It is assumed that the common and confidential data is stored in buffers prior to transmission and the transmitter operates under constraints on buffer violation probability.
Mustafa Ozmen, M. Cenk Gursoy
openaire   +1 more source

On the Security–Reliability and Secrecy Throughput of Random Mobile User in Internet of Things

IEEE Internet of Things Journal, 2020
Physical-layer security (PLS) in Internet of Things (IoT) has attracted great attentions recently. Although mobility is an intrinsic property of IoT networks, most of the existing works only investigate the secure transmission design for static users. To
Jie Tang   +4 more
semanticscholar   +1 more source

Throughput maximization in multiantenna OFDMA downlink under secrecy rate constraints

2014 IEEE Wireless Communications and Networking Conference (WCNC), 2014
This paper deals with the problem of sum rate maximization for a multiuser orthogonal frequency-division multiple access channel with secrecy rate constraints. We consider the case of a multiple-antenna base station (BS) and several single-antenna downlink receivers; a single secure user, a single eavesdropper and several normal users (without secrecy ...
Karachontzitis, S.   +5 more
openaire   +2 more sources

Maximizing effective secrecy throughput in SLIPT-based underwater wireless optical communication systems with artificial noise.

Applied Optics
In this paper, we investigate the physical layer security of a vertical relay-assisted underwater wireless optical communication system with simultaneous lightwave information and power transfer and artificial noise to enhance both security and energy ...
Gan Li, Tao Shang, Tang Tang, Qian Li
semanticscholar   +1 more source

On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ

IEEE Communications Letters, 2014
This work has studied the physical layer security in cooperative automatic-repeat-request (CARQ), under the assumption of no instantaneous channel state information (CSI) at legitimate users. Different from present works, this paper not only derives closed form expressions for connection outage probability (COP) and secrecy outage probability (SOP) to ...
Xinrong Guan, Yueming Cai, Weiwei Yang
openaire   +1 more source

Enhancement of Secrecy Throughput Performance in a Cooperative Network with Interference-assisted Energy Harvesting

International Symposium Advanced Electrical and Communication Technologies, 2019
A novel approach comprising of "Destination-based Jamming" (DJ) technique with "Interference-assisted Energy harvesting" (EH) in a "Cooperative Network" (CN) has been discussed in this paper.
Chandrima Thakur, S. Chattopadhyay
semanticscholar   +1 more source

Generalized delay-secrecy-throughput trade-offs in mobile ad-hoc networks

2011 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications, 2011
In this paper, we first present a theoretical framework aimed at generalizing the scaling laws of delay, secrecy and throughput in mobile ad-hoc networks for various network models and scheduling policies available in the literature. We derive new scaling laws for throughput-delay trade-offs for routing policies such as Spray-and-Wait. A model based on
Shintre, Saurabh   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy