Results 261 to 270 of about 560,014 (299)
Some of the next articles are maybe not open access.
Secrecy Rate Pair Constraints for Secure Throughput
2014 IEEE Military Communications Conference, 2014Physical layer security, which is an alternative to traditional cryptographic methods, has emerged as a promising candidate to protect wireless transmissions from an eavesdropper. An important measure of physical layer security is the secrecy outage: the event when the instantaneous secrecy capacity, which for the considered scenario is the difference ...
Kyle Morrison, Dennis Goeckel
openaire +1 more source
Secrecy throughput of MANETs with malicious nodes
2009 IEEE International Symposium on Information Theory, 2009The secrecy throughput of mobile ad-hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D. An information theoretic approach for security is applied to achieve secure communication among legitimate ...
Yingbin Liang, H. Vincent Poor, Lei Ying
openaire +1 more source
Secrecy Throughput of MANETs Under Passive and Active Attacks
IEEE Transactions on Information Theory, 2011The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D. A model under passive attack is first studied, in which the malicious nodes are assumed to be eavesdroppers ...
Yingbin Liang, H. Vincent Poor, Lei Ying
openaire +1 more source
Throughput and energy efficiency under queueing and secrecy constraints
2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), 2012A broadcast model in which the transmitter sends confidential and common messages to two receivers is considered. It is assumed that the common and confidential data is stored in buffers prior to transmission and the transmitter operates under constraints on buffer violation probability.
Mustafa Ozmen, M. Cenk Gursoy
openaire +1 more source
On the Security–Reliability and Secrecy Throughput of Random Mobile User in Internet of Things
IEEE Internet of Things Journal, 2020Physical-layer security (PLS) in Internet of Things (IoT) has attracted great attentions recently. Although mobility is an intrinsic property of IoT networks, most of the existing works only investigate the secure transmission design for static users. To
Jie Tang +4 more
semanticscholar +1 more source
Throughput maximization in multiantenna OFDMA downlink under secrecy rate constraints
2014 IEEE Wireless Communications and Networking Conference (WCNC), 2014This paper deals with the problem of sum rate maximization for a multiuser orthogonal frequency-division multiple access channel with secrecy rate constraints. We consider the case of a multiple-antenna base station (BS) and several single-antenna downlink receivers; a single secure user, a single eavesdropper and several normal users (without secrecy ...
Karachontzitis, S. +5 more
openaire +2 more sources
Applied Optics
In this paper, we investigate the physical layer security of a vertical relay-assisted underwater wireless optical communication system with simultaneous lightwave information and power transfer and artificial noise to enhance both security and energy ...
Gan Li, Tao Shang, Tang Tang, Qian Li
semanticscholar +1 more source
In this paper, we investigate the physical layer security of a vertical relay-assisted underwater wireless optical communication system with simultaneous lightwave information and power transfer and artificial noise to enhance both security and energy ...
Gan Li, Tao Shang, Tang Tang, Qian Li
semanticscholar +1 more source
On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ
IEEE Communications Letters, 2014This work has studied the physical layer security in cooperative automatic-repeat-request (CARQ), under the assumption of no instantaneous channel state information (CSI) at legitimate users. Different from present works, this paper not only derives closed form expressions for connection outage probability (COP) and secrecy outage probability (SOP) to ...
Xinrong Guan, Yueming Cai, Weiwei Yang
openaire +1 more source
International Symposium Advanced Electrical and Communication Technologies, 2019
A novel approach comprising of "Destination-based Jamming" (DJ) technique with "Interference-assisted Energy harvesting" (EH) in a "Cooperative Network" (CN) has been discussed in this paper.
Chandrima Thakur, S. Chattopadhyay
semanticscholar +1 more source
A novel approach comprising of "Destination-based Jamming" (DJ) technique with "Interference-assisted Energy harvesting" (EH) in a "Cooperative Network" (CN) has been discussed in this paper.
Chandrima Thakur, S. Chattopadhyay
semanticscholar +1 more source
Generalized delay-secrecy-throughput trade-offs in mobile ad-hoc networks
2011 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications, 2011In this paper, we first present a theoretical framework aimed at generalizing the scaling laws of delay, secrecy and throughput in mobile ad-hoc networks for various network models and scheduling policies available in the literature. We derive new scaling laws for throughput-delay trade-offs for routing policies such as Spray-and-Wait. A model based on
Shintre, Saurabh +2 more
openaire +2 more sources

