Results 41 to 50 of about 3,650 (187)
Cooperative Covert Communication With Transceiver Hardware Impairments
This study investigates covert communication in the presence of a half-duplex amplify-and-forward (AF) relay, while accounting for transceiver hardware impairments. A cooperative jamming strategy and channel uncertainty are employed to achieve covertness.
Mohammad Reza Yari +2 more
doaj +1 more source
A novel secure relay selection strategy for energy-harvesting-enabled Internet of things
In this article, we focus on the problem of relay selection for the cooperative cognitive radio-based Internet of things. In such systems, a pair of primary user devices (PUs) can only communicate with each other through a relay.
Yan Huo, Mi Xu, Xin Fan, Tao Jing
doaj +1 more source
High-Speed Measurement-Device-Independent Quantum Key Distribution with Integrated Silicon Photonics
Measurement-device-independent quantum key distribution (MDI QKD) removes all detector side channels and enables secure QKD with an untrusted relay.
Kejin Wei +14 more
doaj +1 more source
The secrecy rate of two‐way untrusted relay networks with imperfect channel state information based on SWIPT is investigated when multiple relays harvest energy from two sources.
Dayong Yang +3 more
doaj +1 more source
Joint Secure Beamforming for Cognitive Radio Networks with Untrusted Secondary Users
In this paper, we consider simultaneous wireless information and power transfer (SWIPT) in orthogonal frequency division multiple access (OFDMA) systems with the coexistence of information receivers (IRs) and energy receivers (ERs).
Liu, Yuan, Zhang, Meng
core +1 more source
Blockchain in Communication Networks: A Comprehensive Review
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley +1 more source
Exploiting privacy‐aware user task offloading in a multi‐UAV–assisted edge computing system offers a new approach to reduce and balance energy consumption and latency. However, the complexity and variability of operating scenarios can make privacy‐aware user task offloading strategies challenging. This paper examines a system with multiple ground users,
Ke Jiang +7 more
wiley +1 more source
For the self-energy recycling (SER) untrusted relay network, a two-phase destination-based jamming (DBJ) protocol is proposed, in which the destination transmits the jamming signal to reduce the received SNR of the untrusted relay node in the first phase
Siyang Xu +4 more
doaj +1 more source
ABSTRACT Introduction The popularization of blockchain‐based applications made evident a critical challenge, namely the inherent isolation of these decentralized systems, akin to the disconnected and technologically diverse local area networks of the 1970s. This lack of interoperability limits the potential for widespread adoption and innovation in the
Christian Delgado‐von‐Eitzen +3 more
wiley +1 more source
Quantum key distribution (QKD) can protect the exchange process of confidential information between communicating parties. By using the basic principles of quantum mechanics and combined with “one-time pad” cipher encryption, information can be ...
Qin Zhang +4 more
doaj +1 more source

