Results 31 to 40 of about 560,014 (299)
Optimal Beamforming for Physical Layer Security in MISO Wireless Networks [PDF]
A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas while the users and eavesdropper are equipped with a single antenna, is considered.
Duong, Trung Q. +3 more
core +2 more sources
Physical Layer Security of WPCNs With Imperfect CSI and Full-Duplex Receiver Aided Jamming
In this paper, we investigate the secrecy performance of wireless powered communication networks (WPCNs) faced by multiple passive eavesdroppers, where the full-duplex (FD) receiver utilizes the harvested energy to send the artificial jamming for ...
Mu Li +4 more
doaj +1 more source
Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks
In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed.
Xuanxuan Tang +5 more
doaj +1 more source
Physical Layer Security of Dual-Hop Hybrid FSO-mmWave Systems
Hybrid free-space optical (FSO) and millimeter wave (mmWave) systems have been proposed as an efficient solution to improve spectral efficiency and maintain link reliability.
Saud Althunibat +4 more
doaj +1 more source
Secure Communication with a Wireless-Powered Friendly Jammer [PDF]
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission.
Durrani, Salman +3 more
core +2 more sources
Enhancing Physical Layer Security of DF Buffer-Aided Relay Networks With Small Buffer Sizes
In this paper, we propose a novel max-weight secure link selection (MWSLS) scheme to enhance physical layer security of decode-and-forward (DF) buffer-aided relay networks. The MWSLS scheme can select the link with the largest weight among all secure and
Chen Wei +3 more
doaj +1 more source
In order to meet the demands of diverse services within sixth-generation networks across a range of industries, numerous approaches are being employed to address notable signal degradation resulting from channel obstruction, particularly in the realms of
Md. Mijanur Rahman +5 more
doaj +1 more source
Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency.
Yue Wu +4 more
doaj +1 more source
In this paper, we investigate secure communication in a hybrid relay (HR)-assisted wireless powered cooperative communication network (WPCCN), where an eavesdropper tries to intercept the data transmitted by a source user and the HR simultaneously.
Xiaohui Shang +4 more
doaj +1 more source
Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative ...
Maoqiang Yang +5 more
doaj +1 more source

