Results 51 to 60 of about 3,690 (182)

Secrecy Transmission for Self-Energy Recycling Untrusted Relay Networks With Imperfect Channel State Information

open access: yesIEEE Access, 2019
For the self-energy recycling (SER) untrusted relay network, a two-phase destination-based jamming (DBJ) protocol is proposed, in which the destination transmits the jamming signal to reduce the received SNR of the untrusted relay node in the first phase
Siyang Xu   +4 more
doaj   +1 more source

End-to-End Physical Layer Authentication for Dual-Hop Wireless Networks

open access: yesIEEE Access, 2019
End-to-end (E2E) physical layer authentication for multi-hop wireless networks is still not well-explored by now. Like one step forward in this direction, this paper focuses on the E2E physical layer authentication in a dual-hop wireless network with an ...
Pinchang Zhang   +3 more
doaj   +1 more source

Topology-Abstraction-Based Protection Scheme in Quantum Key Distribution Networks with Partially Trusted Relays

open access: yesPhotonics, 2022
Quantum key distribution (QKD) can protect the exchange process of confidential information between communicating parties. By using the basic principles of quantum mechanics and combined with “one-time pad” cipher encryption, information can be ...
Qin Zhang   +4 more
doaj   +1 more source

Blockchain in Communication Networks: A Comprehensive Review

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley   +1 more source

Dual IRS‐Assisted Secure Communication for Untrusted Two‐Way AF Relay Network

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
To address the performance loss caused by the difficulty of balancing phase configuration requirements in single‐IRS‐assisted asymmetric bidirectional secure relay communication, this paper proposes a dual‐IRS collaborative optimization framework. Specifically, each user is configured with a dedicated IRS to enable personalized signal reflection, and ...
Yibo Wang, An Li, Lisu Yu, Kaijun Peng
wiley   +1 more source

A Secure Wireless Information and Energy Cooperation Transmission Strategy in Spectrum Sharing Networks With Untrusted Dual-Relay

open access: yesIEEE Access, 2019
Spectrum efficiency, energy efficiency, and physical layer security are three critical issues in designing wireless networks, such as an energy-constrained device-to-device (D2D) communication in secure spectrum sharing femtocell networks. In this paper,
Daqian Zhao, Hui Tian, Ping Zhang
doaj   +1 more source

Security Energy Efficiency Maximization for Untrusted Relay Assisted NOMA-MEC Network With WPT

open access: yesIEEE Access, 2020
Relay assisted transmission can effectively improve the range of coverage and offloading efficiency of non-orthogonal multiple access-mobile edge computing (NOMA-MEC) system. However, the relay will become untrusted relay when it is attacked by malicious
Pinfang Zhao   +3 more
doaj   +1 more source

Secrecy Performance of a Multi-NOMA-MIMO System in the UEH Relaying Network Using the PSO Algorithm

open access: yesIEEE Access, 2021
In this paper, we investigate the secrecy performance of the nonorthogonal multiple access (NOMA) system in an untrusted relaying energy harvesting (UEH) network with the multiple-input multiple-output (MIMO) architecture using the maximum ratio ...
Thi Le Anh, Ic Pyo Hong
doaj   +1 more source

Overview of Polkadot and its Design Considerations [PDF]

open access: yes, 2020
In this paper we describe the design components of the heterogenous multi-chain protocol Polkadot and explain how these components help Polkadot address some of the existing shortcomings of blockchain technologies. At present, a vast number of blockchain
Alper, Handan Kilinc   +10 more
core   +1 more source

Quantum Key Distribution Networks Design: Overview and Challenges

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
This paper explores the potential of using established QKD network design techniques in the context of quantum key distribution, which is based on the principles of quantum mechanics. ABSTRACT Quantum cryptography has increasingly attracted interest from both industry and academia for its potential in real‐world applications.
Pankaj Kumar   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy