Results 31 to 40 of about 9,853 (272)

Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers

open access: yesEntropy, 2020
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency.
Yue Wu   +4 more
doaj   +1 more source

Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays

open access: yes, 2015
We enhance the physical-layer security (PLS) of amplify-and-forward relaying networks with the aid of joint relay and jammer selection (JRJS), despite the deliterious effect of channel state information (CSI) feedback delays.
Cai, Yueming   +4 more
core   +1 more source

Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

open access: yesSensors, 2016
In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative ...
Maoqiang Yang   +5 more
doaj   +1 more source

Secure Multiuser Scheduling for Hybrid Relay-Assisted Wireless Powered Cooperative Communication Networks With Full-Duplex Destination-Based Jamming

open access: yesIEEE Access, 2021
In this paper, we investigate secure communication in a hybrid relay (HR)-assisted wireless powered cooperative communication network (WPCCN), where an eavesdropper tries to intercept the data transmitted by a source user and the HR simultaneously.
Xiaohui Shang   +4 more
doaj   +1 more source

Optimal Number of Transmit Antennas for Secrecy Enhancement in Massive MIMOME Channels

open access: yes, 2017
This paper studies the impact of transmit antenna selection on the secrecy performance of massive MIMO wiretap channels. We consider a scenario in which a multi-antenna transmitter selects a subset of transmit antennas with the strongest channel gains ...
Asaad, Saba   +4 more
core   +1 more source

Secure Cognitive MIMO Wiretap Networks With Different Antenna Transmission Schemes

open access: yesIEEE Access, 2021
This paper investigates a secure transmission in the multiple-input multiple-output (MIMO) cognitive wiretap networks, where a secondary transmitter (Alice) sends data to a secondary receiver (Bob) in the presence of an eavesdropper (Eve).
Yong Chen   +4 more
doaj   +1 more source

Zero-Outage Secrecy in Short Packet IoT-Aided Cellular Cooperative Network With EH-NOMA

open access: yesIEEE Access
The zero-outage secrecy with energy harvesting is considered in short packet IoT-aided cellular cooperative networks using the inspired non-orthogonal multiple access (NOMA) strategy.
Hien Quang Ta   +3 more
doaj   +1 more source

On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA

open access: yesIEEE Access, 2019
In this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO) energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base station (BS) transmits signals to IoT devices (IoTDs) with the help of ...
Van Nhan Vo   +6 more
doaj   +1 more source

Enhancing Physical Layer Secrecy Performance for RIS-Assisted RF-FSO Mixed Wireless System

open access: yesIEEE Access, 2023
The reconfigurable intelligent surface (RIS) is widely recognized as an effective solution for enhancing security in wireless communications, owing to its passive reflective components and the ability to adjust signal phases. In light of this, this study
Tahmid Ahmed   +6 more
doaj   +1 more source

Enhancing Secrecy with Multi-Antenna Transmission in Wireless Ad Hoc Networks

open access: yes, 2013
We study physical-layer security in wireless ad hoc networks and investigate two types of multi-antenna transmission schemes for providing secrecy enhancements.
McKay, Matthew R.   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy