Results 81 to 90 of about 3,690 (182)

Asymptotic Analysis on Spatial Coupling Coding for Two-Way Relay Channels

open access: yes, 2018
Compute-and-forward relaying is effective to increase bandwidth efficiency of wireless two-way relay channels. In a compute-and-forward scheme, a relay tries to decode a linear combination composed of transmitted messages from other terminals or relays ...
Hayashi, Masahito   +3 more
core   +1 more source

Comprehensive Strategies for Enhancing SD‐WAN: Integrating Security, Dynamic Routing and Quality of Service Management

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim   +3 more
wiley   +1 more source

Secrecy Performance Analysis of Energy Harvesting Untrusted Relay Networks with Hardware Impairments

open access: yesInternational Journal of Distributed Sensor Networks
In this work, we focus on the issue of secure communication in energy harvesting untrusted relay networks taking into account the impact of hardware impairments, where an energy-constrained relay, powered by received radio frequency signals, attempts to ...
Dechuan Chen   +5 more
doaj   +1 more source

BLOCKVISA: A Blockchain‐Based System for Efficient and Secure Visa, Passport, and Immigration Verification

open access: yesIET Software, Volume 2025, Issue 1, 2025.
In the fast‐changing landscape of global mobility, the need for secure, efficient, and interoperable visa, passport, and immigration verification systems has never been higher. Traditional systems are inefficient, have security vulnerabilities, and exhibit poor interoperability.
Faraz Masood   +3 more
wiley   +1 more source

A Secure Data Aggregation Scheme to Traceback Malicious Charging Piles for Large‐Scale V2G Data‐Sharing Scenarios

open access: yesIET Smart Grid, Volume 8, Issue 1, January/December 2025.
This study tackles the critical issue of securing data transmission from charging piles in vehicle‐to‐grid (V2G) systems, where false data injection attacks can compromise user privacy and system integrity. We propose a novel data aggregation scheme that combines group‐based anomaly detection with elliptic curve cryptography.
Nan Zhang   +6 more
wiley   +1 more source

Secure Computation-and-Forward with Linear Codes

open access: yes, 2018
We discuss secure transmission via an untrusted relay when we have a multiple access phase from two nodes to the relay and broadcast phase from the relay to the two nodes.
Hayashi, Masahito   +2 more
core  

Optimising Internet of Things (IoT) Performance Through Cloud, Fog and Edge Computing Architecture

open access: yesIET Wireless Sensor Systems, Volume 15, Issue 1, January/December 2025.
This review examines the integration of IoT with cloud, fog, and edge computing, highlighting their collective potential to enhance scalability, reduce latency, and improve computational efficiency. Whereas cloud computing offers scalable processing, fog and edge computing mitigate latency issues, improving response times by up to 40% and 30 ...
Shams Forruque Ahmed   +5 more
wiley   +1 more source

Secure communication via untrusted switchable decode-and-forward relay

open access: yes2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), 2017
In this paper, a practical power efficient technique is proposed for an untrusted decode-and-forward (DAF) based cooperative communication system to provide secure communication between the source and the destination. More specifically, a DAF relay, called switchable DAF (sDAF), is designed in such a way that it can be switched to amplify-and-forward ...
Haji M. Furqan   +2 more
openaire   +3 more sources

Distributed Matching Algorithms: Maximizing Secrecy in the Presence of Untrusted Relay [PDF]

open access: yesRadioengineering, 2017
In this paper, we propose a secrecy sum-rate maximization based matching algorithm between primary transmitters and secondary cooperative jammers in the presence of an eavesdropper.
B. Ali   +3 more
doaj  

Cooperative Interference and Power Allocation in a Bidirectional Untrusted Relay Network With Channel Estimation Errors

open access: yesIEEE Access, 2018
The secure communication of a two-way untrusted amplify-and-forward relay network under the imperfect channel state information is investigated. To improve the secrecy of the relay wiretap system, artificial noise is introduced into each source signal ...
Lihua Gong   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy