Results 61 to 70 of about 3,690 (182)
On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA
In this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO) energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base station (BS) transmits signals to IoT devices (IoTDs) with the help of ...
Van Nhan Vo +6 more
doaj +1 more source
Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan +3 more
wiley +1 more source
In device-independent quantum key distribution (DIQKD), the violation of a Bell inequality is exploited to establish a shared key that is secure independently of the internal workings of the QKD devices.
Gisin, Nicolas +2 more
core +2 more sources
Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward [PDF]
We investigate the problem of secure communications in a Gaussian multi-way relay channel applying the compute-and-forward scheme using nested lattice codes. All nodes employ half-duplex operation and can exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an eavesdropper that conforms to the
Johannes Richter +3 more
openaire +2 more sources
Exploiting privacy‐aware user task offloading in a multi‐UAV–assisted edge computing system offers a new approach to reduce and balance energy consumption and latency. However, the complexity and variability of operating scenarios can make privacy‐aware user task offloading strategies challenging. This paper examines a system with multiple ground users,
Ke Jiang +7 more
wiley +1 more source
Secure transmission in an unfriendly environment
This work investigates and show the performance of destination assisted node in ensuring secure communication in a dual-hop broadcast system. The information transmission occurs between the transmitters which are assumed to be equipped with single ...
Lukman A. Olawoyin +6 more
doaj +1 more source
A Review of the Internet of Things (IoT) Landscape: Technologies, Applications, and Open Challenges
The Internet of Things (IoT) has emerged as a large‐scale ecosystem that integrates sensing, communication, and computation across diverse application domains. Its deployment spans smart homes, wearable devices, industrial automation, and smart cities, where heterogeneous devices are required to operate under strict performance, reliability, and ...
Sidna Jeddou +5 more
wiley +1 more source
Enhancing Physical Layer Security in AF Relay Assisted Multi-Carrier Wireless Transmission
In this paper, we study the physical layer security (PLS) problem in the dual hop orthogonal frequency division multiplexing (OFDM) based wireless communication system.
Ali, Zain +3 more
core +1 more source
ABSTRACT Introduction The popularization of blockchain‐based applications made evident a critical challenge, namely the inherent isolation of these decentralized systems, akin to the disconnected and technologically diverse local area networks of the 1970s. This lack of interoperability limits the potential for widespread adoption and innovation in the
Christian Delgado‐von‐Eitzen +3 more
wiley +1 more source
Dynamic Continuous Variable Quantum Key Distribution for Securing a Future Global Quantum Network
The article explores securing a dynamic global quantum network using continuous variable QKD, proposing a unified three‐layer network architecture for integrating existing QKD networks. It evaluates secret key rates across various channels and introduces the link capacity as a metric for determining the optimum path for secret key distribution in a ...
Mikhael T. Sayat +4 more
wiley +1 more source

