Results 51 to 60 of about 3,690 (182)
For the self-energy recycling (SER) untrusted relay network, a two-phase destination-based jamming (DBJ) protocol is proposed, in which the destination transmits the jamming signal to reduce the received SNR of the untrusted relay node in the first phase
Siyang Xu +4 more
doaj +1 more source
End-to-End Physical Layer Authentication for Dual-Hop Wireless Networks
End-to-end (E2E) physical layer authentication for multi-hop wireless networks is still not well-explored by now. Like one step forward in this direction, this paper focuses on the E2E physical layer authentication in a dual-hop wireless network with an ...
Pinchang Zhang +3 more
doaj +1 more source
Quantum key distribution (QKD) can protect the exchange process of confidential information between communicating parties. By using the basic principles of quantum mechanics and combined with “one-time pad” cipher encryption, information can be ...
Qin Zhang +4 more
doaj +1 more source
Blockchain in Communication Networks: A Comprehensive Review
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley +1 more source
Dual IRS‐Assisted Secure Communication for Untrusted Two‐Way AF Relay Network
To address the performance loss caused by the difficulty of balancing phase configuration requirements in single‐IRS‐assisted asymmetric bidirectional secure relay communication, this paper proposes a dual‐IRS collaborative optimization framework. Specifically, each user is configured with a dedicated IRS to enable personalized signal reflection, and ...
Yibo Wang, An Li, Lisu Yu, Kaijun Peng
wiley +1 more source
Spectrum efficiency, energy efficiency, and physical layer security are three critical issues in designing wireless networks, such as an energy-constrained device-to-device (D2D) communication in secure spectrum sharing femtocell networks. In this paper,
Daqian Zhao, Hui Tian, Ping Zhang
doaj +1 more source
Security Energy Efficiency Maximization for Untrusted Relay Assisted NOMA-MEC Network With WPT
Relay assisted transmission can effectively improve the range of coverage and offloading efficiency of non-orthogonal multiple access-mobile edge computing (NOMA-MEC) system. However, the relay will become untrusted relay when it is attacked by malicious
Pinfang Zhao +3 more
doaj +1 more source
Secrecy Performance of a Multi-NOMA-MIMO System in the UEH Relaying Network Using the PSO Algorithm
In this paper, we investigate the secrecy performance of the nonorthogonal multiple access (NOMA) system in an untrusted relaying energy harvesting (UEH) network with the multiple-input multiple-output (MIMO) architecture using the maximum ratio ...
Thi Le Anh, Ic Pyo Hong
doaj +1 more source
Overview of Polkadot and its Design Considerations [PDF]
In this paper we describe the design components of the heterogenous multi-chain protocol Polkadot and explain how these components help Polkadot address some of the existing shortcomings of blockchain technologies. At present, a vast number of blockchain
Alper, Handan Kilinc +10 more
core +1 more source
Quantum Key Distribution Networks Design: Overview and Challenges
This paper explores the potential of using established QKD network design techniques in the context of quantum key distribution, which is based on the principles of quantum mechanics. ABSTRACT Quantum cryptography has increasingly attracted interest from both industry and academia for its potential in real‐world applications.
Pankaj Kumar +2 more
wiley +1 more source

