Results 41 to 50 of about 3,690 (182)
Cooperative Covert Communication With Transceiver Hardware Impairments
This study investigates covert communication in the presence of a half-duplex amplify-and-forward (AF) relay, while accounting for transceiver hardware impairments. A cooperative jamming strategy and channel uncertainty are employed to achieve covertness.
Mohammad Reza Yari +2 more
doaj +1 more source
A novel secure relay selection strategy for energy-harvesting-enabled Internet of things
In this article, we focus on the problem of relay selection for the cooperative cognitive radio-based Internet of things. In such systems, a pair of primary user devices (PUs) can only communicate with each other through a relay.
Yan Huo, Mi Xu, Xin Fan, Tao Jing
doaj +1 more source
The secrecy rate of two‐way untrusted relay networks with imperfect channel state information based on SWIPT is investigated when multiple relays harvest energy from two sources.
Dayong Yang +3 more
doaj +1 more source
Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks
Abstract This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay \(R\). For the covertness, we attempt to prevent Willie from detecting the very existence of communications ...
Ranran Sun +4 more
openaire +2 more sources
High-Speed Measurement-Device-Independent Quantum Key Distribution with Integrated Silicon Photonics
Measurement-device-independent quantum key distribution (MDI QKD) removes all detector side channels and enables secure QKD with an untrusted relay.
Kejin Wei +14 more
doaj +1 more source
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence
Fakoorian, S. A. A. +3 more
core +1 more source
Joint Secure Beamforming for Cognitive Radio Networks with Untrusted Secondary Users
In this paper, we consider simultaneous wireless information and power transfer (SWIPT) in orthogonal frequency division multiple access (OFDMA) systems with the coexistence of information receivers (IRs) and energy receivers (ERs).
Liu, Yuan, Zhang, Meng
core +1 more source
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer [PDF]
In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer.
Kuhestani, Ali +2 more
core +2 more sources
Performance Evaluation of Privacy Models for Data Streams on the Edge
ABSTRACT Recent advances in edge computing enable data stream privacy enforcement directly on resource‐constrained devices, reducing latency and the exposure of sensitive information. In this paper, we extend and validate our previously proposed privacy‐enforcing framework, which allows high‐level privacy policies to be expressed as chains of triggers ...
Ilir Murturi +3 more
wiley +1 more source

