Results 51 to 60 of about 3,650 (187)

Joint Antenna and User Selection for Untrusted Relay Networks [PDF]

open access: yes2018 IEEE Global Communications Conference (GLOBECOM), 2018
In this paper, we investigate secure communication for an untrusted relay network, in which a source equipped with $N_{S}$ antennas communicates to $M$ users with the help of an untrusted relay. To protect the data confidentially while concurrently relying on the untrusted relays, joint antenna and user selection scheme has been proposed with the ...
He, B.   +4 more
openaire   +1 more source

Dynamic Continuous Variable Quantum Key Distribution for Securing a Future Global Quantum Network

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 10, October 2025.
The article explores securing a dynamic global quantum network using continuous variable QKD, proposing a unified three‐layer network architecture for integrating existing QKD networks. It evaluates secret key rates across various channels and introduces the link capacity as a metric for determining the optimum path for secret key distribution in a ...
Mikhael T. Sayat   +4 more
wiley   +1 more source

End-to-End Physical Layer Authentication for Dual-Hop Wireless Networks

open access: yesIEEE Access, 2019
End-to-end (E2E) physical layer authentication for multi-hop wireless networks is still not well-explored by now. Like one step forward in this direction, this paper focuses on the E2E physical layer authentication in a dual-hop wireless network with an ...
Pinchang Zhang   +3 more
doaj   +1 more source

Secrecy Performance of a Multi-NOMA-MIMO System in the UEH Relaying Network Using the PSO Algorithm

open access: yesIEEE Access, 2021
In this paper, we investigate the secrecy performance of the nonorthogonal multiple access (NOMA) system in an untrusted relaying energy harvesting (UEH) network with the multiple-input multiple-output (MIMO) architecture using the maximum ratio ...
Thi Le Anh, Ic Pyo Hong
doaj   +1 more source

Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development

open access: yesSustainable Development, Volume 33, Issue 4, Page 5874-5889, August 2025.
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley   +1 more source

A Secure Wireless Information and Energy Cooperation Transmission Strategy in Spectrum Sharing Networks With Untrusted Dual-Relay

open access: yesIEEE Access, 2019
Spectrum efficiency, energy efficiency, and physical layer security are three critical issues in designing wireless networks, such as an energy-constrained device-to-device (D2D) communication in secure spectrum sharing femtocell networks. In this paper,
Daqian Zhao, Hui Tian, Ping Zhang
doaj   +1 more source

Security Energy Efficiency Maximization for Untrusted Relay Assisted NOMA-MEC Network With WPT

open access: yesIEEE Access, 2020
Relay assisted transmission can effectively improve the range of coverage and offloading efficiency of non-orthogonal multiple access-mobile edge computing (NOMA-MEC) system. However, the relay will become untrusted relay when it is attacked by malicious
Pinfang Zhao   +3 more
doaj   +1 more source

Proposal for Implementing Device-Independent Quantum Key Distribution based on a Heralded Qubit Amplification

open access: yes, 2010
In device-independent quantum key distribution (DIQKD), the violation of a Bell inequality is exploited to establish a shared key that is secure independently of the internal workings of the QKD devices.
Gisin, Nicolas   +2 more
core   +2 more sources

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, Volume 43, Issue 3, Page 164-192, May/June 2025.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA

open access: yesIEEE Access, 2019
In this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO) energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base station (BS) transmits signals to IoT devices (IoTDs) with the help of ...
Van Nhan Vo   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy