Results 21 to 30 of about 560,014 (299)
Secure User Association in Two-Tier Heterogeneous Cellular Networks With In-Band Interference
In this paper, we address the issue of security-concerned user association in two-tier heterogeneous cellular networks with in-band interference. Different from the maximum secrecy capacity association (max-SC), which studied multi-tier heterogeneous ...
Shijie Wang +4 more
doaj +1 more source
Enhancing wireless security via optimal cooperative jamming [PDF]
In this work, we analyze the secrecy rate in a cooperative network, where a source node is assisted by relay nodes via cooperative jamming for delivering a secret message to the destination in the presence of an eavesdropper node.
Gurbuz, Ozgur +3 more
core +1 more source
Secure Transmission for Relay Wiretap Channels in the Presence of Spatially Random Eavesdroppers [PDF]
We propose a secure transmission scheme for a relay wiretap channel, where a source communicates with a destination via a decode-and-forward relay in the presence of spatially random-distributed eavesdroppers.
Liu, Chenxi +3 more
core +2 more sources
This study discusses an augmented investigation of the hybrid wiretap channel, which represents a PLC system with its data security threatened by a malicious and passive wireless device at the physical layer level, by focusing on the evaluation and ...
Ândrei Camponogara +1 more
semanticscholar +1 more source
Optical HAPS Eavesdropping in Vertical Heterogeneous Networks
In the next generation (6G) wireless networks, the integration of terrestrial and non-terrestrial networks is essential to provide flawless connectivity over the globe.
Eylem Erdogan +3 more
doaj +1 more source
Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages
Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link ...
Yi Song +4 more
doaj +1 more source
On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels [PDF]
In this paper, we investigate the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels. The primary design concerns include the transmit power allocation and the rate parameters of the wiretap code.
Matthew R. Mckay +3 more
core +2 more sources
Security–reliability tradeoff analysis of untrusted energy harvesting relay networks
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential ...
Dechuan Chen +4 more
doaj +1 more source
Impact of Heterogeneity and Secrecy on theCapacity of Wireless Sensor Networks
This paper investigates the achievable secrecy throughput of an inhomogeneous wireless sensor network. We consider the impact of topology heterogeneity and the secrecy constraint on the throughput. For the topology heterogeneity, by virtue of percolation
Qiuming Liu, Li Yu, Zuhao Liu, Jun Zheng
doaj +1 more source
Jamming-Aided Secrecy Performance in Secure Uplink NOMA System
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with cooperative jammer(s) to improve secrecy performance is studied in this work.
Kaiwei Jiang, Weihua Zhou, Lingjie Sun
doaj +1 more source

