Results 41 to 50 of about 3,690 (182)

Cooperative Covert Communication With Transceiver Hardware Impairments

open access: yesIEEE Open Journal of the Communications Society
This study investigates covert communication in the presence of a half-duplex amplify-and-forward (AF) relay, while accounting for transceiver hardware impairments. A cooperative jamming strategy and channel uncertainty are employed to achieve covertness.
Mohammad Reza Yari   +2 more
doaj   +1 more source

A novel secure relay selection strategy for energy-harvesting-enabled Internet of things

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
In this article, we focus on the problem of relay selection for the cooperative cognitive radio-based Internet of things. In such systems, a pair of primary user devices (PUs) can only communicate with each other through a relay.
Yan Huo, Mi Xu, Xin Fan, Tao Jing
doaj   +1 more source

Secrecy rate optimization for SWIPT in two‐way relay networks with multiple untrusted relays and channel estimation errors

open access: yesIET Communications, 2021
The secrecy rate of two‐way untrusted relay networks with imperfect channel state information based on SWIPT is investigated when multiple relays harvest energy from two sources.
Dayong Yang   +3 more
doaj   +1 more source

Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks

open access: yesIEEE Internet of Things Journal, 2023
Abstract This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay \(R\). For the covertness, we attempt to prevent Willie from detecting the very existence of communications ...
Ranran Sun   +4 more
openaire   +2 more sources

High-Speed Measurement-Device-Independent Quantum Key Distribution with Integrated Silicon Photonics

open access: yesPhysical Review X, 2020
Measurement-device-independent quantum key distribution (MDI QKD) removes all detector side channels and enables secure QKD with an untrusted relay.
Kejin Wei   +14 more
doaj   +1 more source

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

open access: yes, 2014
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence
Fakoorian, S. A. A.   +3 more
core   +1 more source

Joint Secure Beamforming for Cognitive Radio Networks with Untrusted Secondary Users

open access: yes, 2015
In this paper, we consider simultaneous wireless information and power transfer (SWIPT) in orthogonal frequency division multiple access (OFDMA) systems with the coexistence of information receivers (IRs) and energy receivers (ERs).
Liu, Yuan, Zhang, Meng
core   +1 more source

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer [PDF]

open access: yes, 2018
In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer.
Kuhestani, Ali   +2 more
core   +2 more sources

Performance Evaluation of Privacy Models for Data Streams on the Edge

open access: yesInternet Technology Letters, Volume 9, Issue 3, May/June 2026.
ABSTRACT Recent advances in edge computing enable data stream privacy enforcement directly on resource‐constrained devices, reducing latency and the exposure of sensitive information. In this paper, we extend and validate our previously proposed privacy‐enforcing framework, which allows high‐level privacy policies to be expressed as chains of triggers ...
Ilir Murturi   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy