Results 81 to 90 of about 3,690 (182)
Asymptotic Analysis on Spatial Coupling Coding for Two-Way Relay Channels
Compute-and-forward relaying is effective to increase bandwidth efficiency of wireless two-way relay channels. In a compute-and-forward scheme, a relay tries to decode a linear combination composed of transmitted messages from other terminals or relays ...
Hayashi, Masahito +3 more
core +1 more source
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim +3 more
wiley +1 more source
Secrecy Performance Analysis of Energy Harvesting Untrusted Relay Networks with Hardware Impairments
In this work, we focus on the issue of secure communication in energy harvesting untrusted relay networks taking into account the impact of hardware impairments, where an energy-constrained relay, powered by received radio frequency signals, attempts to ...
Dechuan Chen +5 more
doaj +1 more source
In the fast‐changing landscape of global mobility, the need for secure, efficient, and interoperable visa, passport, and immigration verification systems has never been higher. Traditional systems are inefficient, have security vulnerabilities, and exhibit poor interoperability.
Faraz Masood +3 more
wiley +1 more source
This study tackles the critical issue of securing data transmission from charging piles in vehicle‐to‐grid (V2G) systems, where false data injection attacks can compromise user privacy and system integrity. We propose a novel data aggregation scheme that combines group‐based anomaly detection with elliptic curve cryptography.
Nan Zhang +6 more
wiley +1 more source
Secure Computation-and-Forward with Linear Codes
We discuss secure transmission via an untrusted relay when we have a multiple access phase from two nodes to the relay and broadcast phase from the relay to the two nodes.
Hayashi, Masahito +2 more
core
Optimising Internet of Things (IoT) Performance Through Cloud, Fog and Edge Computing Architecture
This review examines the integration of IoT with cloud, fog, and edge computing, highlighting their collective potential to enhance scalability, reduce latency, and improve computational efficiency. Whereas cloud computing offers scalable processing, fog and edge computing mitigate latency issues, improving response times by up to 40% and 30 ...
Shams Forruque Ahmed +5 more
wiley +1 more source
Secure communication via untrusted switchable decode-and-forward relay
In this paper, a practical power efficient technique is proposed for an untrusted decode-and-forward (DAF) based cooperative communication system to provide secure communication between the source and the destination. More specifically, a DAF relay, called switchable DAF (sDAF), is designed in such a way that it can be switched to amplify-and-forward ...
Haji M. Furqan +2 more
openaire +3 more sources
Distributed Matching Algorithms: Maximizing Secrecy in the Presence of Untrusted Relay [PDF]
In this paper, we propose a secrecy sum-rate maximization based matching algorithm between primary transmitters and secondary cooperative jammers in the presence of an eavesdropper.
B. Ali +3 more
doaj
The secure communication of a two-way untrusted amplify-and-forward relay network under the imperfect channel state information is investigated. To improve the secrecy of the relay wiretap system, artificial noise is introduced into each source signal ...
Lihua Gong +3 more
doaj +1 more source

