Results 71 to 80 of about 3,690 (182)
Secure communications with untrusted relays: a multi‐pair two‐way relaying approach
Physical‐layer security is usually ensured by the injection of artificial noise (AN) at the legitimate source or destination when relays are cooperative but untrusted. In this work, in order to avoid the power‐consuming AN at the legitimate user pairs, the authors investigate multi‐pair two‐way relaying as a solution for secure transmission in wireless
Tantan Zhao +3 more
openaire +1 more source
Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley +1 more source
Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks
In this paper, we investigate the secure transmission in two-way untrusted amplify-and-forward relay networks with simultaneous wireless information and power transfer (SWIPT).
Jiazhen Zhang +3 more
doaj +1 more source
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can
Chen, Zhi +3 more
core +1 more source
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci +7 more
wiley +1 more source
Near-Optimal Modulo-and-Forward Scheme for the Untrusted Relay Channel
This paper studies an untrusted relay channel, in which the destination sends artificial noise simultaneously with the source sending a message to the relay, in order to protect the source's confidential message.
Fan, Lisheng +3 more
core +1 more source
Quantum Network Infrastructure
Quantum computing presents a threat to secure communication. Consequently, novel methods are investigated to address this global challenge, namely post quantum cryptography (PQC) and quantum key distribution (QKD). The image represents the distribution of a wavefunction over the entire world by using satellites in orbit.
Lisa Wörner +7 more
wiley +1 more source
Enhancing Physical Layer Security in Dual-Hop Multiuser Transmission
In this paper, we consider the Physical Layer Security(PLS) problem in orthogonal frequency division multiple access (OFDMA) based dual-hop system which consists of multiple users, multiple amplify and forward relays, and an eavesdropper.
Aman, Waqas +4 more
core +1 more source
Mixing Services in Bitcoin and Ethereum Ecosystems: A Review
This manuscript provides an in‐depth review of blockchain‐based mixing services, bridging the gap between academic research and real‐world applications. It examines core functionalities, operational mechanisms, and potential vulnerabilities, proposing an evaluation framework to assess these services.
Alireza Arbabi +2 more
wiley +1 more source
Joint optimization of beamforming and power allocation for DAJ‐based untrusted relay networks
Destination‐assisted jamming (DAJ) is usually used to protect confidential information against untrusted relays and eavesdroppers in wireless networks. In this paper, a DAJ‐based untrusted relay network with multiple antennas installed is presented.
Rugui Yao +4 more
doaj +1 more source

