Results 51 to 60 of about 3,650 (187)
Joint Antenna and User Selection for Untrusted Relay Networks [PDF]
In this paper, we investigate secure communication for an untrusted relay network, in which a source equipped with $N_{S}$ antennas communicates to $M$ users with the help of an untrusted relay. To protect the data confidentially while concurrently relying on the untrusted relays, joint antenna and user selection scheme has been proposed with the ...
He, B. +4 more
openaire +1 more source
Dynamic Continuous Variable Quantum Key Distribution for Securing a Future Global Quantum Network
The article explores securing a dynamic global quantum network using continuous variable QKD, proposing a unified three‐layer network architecture for integrating existing QKD networks. It evaluates secret key rates across various channels and introduces the link capacity as a metric for determining the optimum path for secret key distribution in a ...
Mikhael T. Sayat +4 more
wiley +1 more source
End-to-End Physical Layer Authentication for Dual-Hop Wireless Networks
End-to-end (E2E) physical layer authentication for multi-hop wireless networks is still not well-explored by now. Like one step forward in this direction, this paper focuses on the E2E physical layer authentication in a dual-hop wireless network with an ...
Pinchang Zhang +3 more
doaj +1 more source
Secrecy Performance of a Multi-NOMA-MIMO System in the UEH Relaying Network Using the PSO Algorithm
In this paper, we investigate the secrecy performance of the nonorthogonal multiple access (NOMA) system in an untrusted relaying energy harvesting (UEH) network with the multiple-input multiple-output (MIMO) architecture using the maximum ratio ...
Thi Le Anh, Ic Pyo Hong
doaj +1 more source
Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley +1 more source
Spectrum efficiency, energy efficiency, and physical layer security are three critical issues in designing wireless networks, such as an energy-constrained device-to-device (D2D) communication in secure spectrum sharing femtocell networks. In this paper,
Daqian Zhao, Hui Tian, Ping Zhang
doaj +1 more source
Security Energy Efficiency Maximization for Untrusted Relay Assisted NOMA-MEC Network With WPT
Relay assisted transmission can effectively improve the range of coverage and offloading efficiency of non-orthogonal multiple access-mobile edge computing (NOMA-MEC) system. However, the relay will become untrusted relay when it is attacked by malicious
Pinfang Zhao +3 more
doaj +1 more source
In device-independent quantum key distribution (DIQKD), the violation of a Bell inequality is exploited to establish a shared key that is secure independently of the internal workings of the QKD devices.
Gisin, Nicolas +2 more
core +2 more sources
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci +7 more
wiley +1 more source
On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA
In this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO) energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base station (BS) transmits signals to IoT devices (IoTDs) with the help of ...
Van Nhan Vo +6 more
doaj +1 more source

