Results 91 to 100 of about 3,690 (182)
Secure physical layer network coding versus secure network coding
Secure network coding realizes the secrecy of the message when the message is transmitted via noiseless network and a part of edges or a part of intermediate nodes are eavesdropped.
Hayashi, Masahito
core
Secrecy Rate-Optimum Energy Splitting for an Untrusted and Energy Harvesting Relay Network
In this paper, a destination-assisted-jamming-based secure transmission is devised for an untrusted and energy harvesting relay network. In the proposed scheme, both source and destination split their energies into two parts for energy harvesting at the ...
Rugui Yao +5 more
doaj +1 more source
Cooperative jamming for energy harvesting multicast networks with an untrusted relay
Recently, there are increasing requirements of security in wireless communications, especially for the multiuser systems. In this study, the authors consider the security of two‐hop cooperative multicast networks with an untrusted relay. An energy harvesting destination aided cooperative jamming framework is proposed to protect information from being ...
Bingtao He +3 more
openaire +1 more source
The secure communication that multiple OFDMA-based cell-edge mobile stations (MS) can only transmit confidential messages to base station (BS) through an untrusted intermediate relay (UR) is discussed.
Weiheng Jiang, Wenjiang Feng
doaj +1 more source
Joint power control for untrusted relay cooperation-based confidential communication
The scenario that multiple cell-edge mobile stations (MS) all without direct-links to the base station (BS) but have confidential messages in the uplink in the presence of untrusted relay (UR) cooperation was considered.In order to implement the secure ...
Wen-jiang FENG +3 more
doaj +2 more sources
Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination
The cooperative relay technique in the field of physical layer security is widely concerned by the academic community,due to the advantages of increasing the network capacity and expanding the network coverage.However,cooperative relays may play as ...
Rui ZHAO +4 more
doaj +2 more sources
Cost-Optimization-Based Quantum Key Distribution over Quantum Key Pool Optical Networks. [PDF]
Jia J, Dong B, Kang L, Xie H, Guo B.
europepmc +1 more source
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay. [PDF]
Hu H, Gao Z, Liao X, Leung VCM.
europepmc +1 more source
Deep Q-Learning-Based Buffer-Aided Relay Selection for Reliable and Secure Communications in Two-Hop Wireless Relay Networks. [PDF]
Zhang C +5 more
europepmc +1 more source
In order to improve the Physical Layer Security (PLS) perspective, this paper aims to empower function of PLS by considering a backhaul Non-Orthogonal Multiple Access (NOMA) system in two practical situations.
Chi-Bao Le +2 more
doaj +1 more source

