Search
Search Results
-
Secure Communication for RF Energy Harvesting NOMA Relaying Networks with Relay-User Selection Scheme and Optimization
In this paper, we study the physical layer security (PLS) of a radio frequency energy harvesting (RF EH) non-orthogonal multiple access (NOMA)...
-
UAV-Terrestrial Communications
By observing the fact that moving in a straight line is a common flying behavior of UAVs in normal applications, e.g., power line inspections and air... -
A Study of Interference Effect on the Performance of RIS-Equipped Source and Relays DF Relay Network
This paper studies the interference impact on the performance of reconfigurable intelligent surface (RIS)-equipped decode-and-forward (DF) relay...
-
Enhancement of Physical Layer Security for Relay Aided Multihop Communication Using Deep Transfer Learning Technique
In order to meet the skyrocketing demand for wireless connectivity, fifth-generation (5G) technologies have lately gained a lot of interest.... -
Performance analysis of overlay-based cognitive radio networks with MRC/SC and DT/AF/DF
This paper studies overlay-based cognitive radio networks (ObCRNs) where transmission from a licensed transmitter (LT) to a licensed receiver (LR) is...
-
-
Detection of Hidden Dangers in 6G Power Grid Relay Protection Based on Support Vector Machine
The integration of Industry 5.0 and the advent of sixth-generation (6G) mobile communication systems have significantly enhanced the operational...
-
Secrecy Analysis of Overlay Mechanism in Radio Frequency Energy Harvesting Networks with Jamming under Nakagami-m fading
Overlay mechanism offers secondary users (SUs) chances to access licensed spectrum of primary users (PUs) to improve spectrum utilization efficiency....
-
Secured Performance Analysis of Double Scattering MIMO Network
In this paper, a practical scenario of multicasting through heterogeneous cellular network has been considered. The macro base station of macro cell...
-
Physical Layer Security in MIMO Relay-Based Cognitive Radio Network
Cognitive radio networks are one of the predominant technologies to solve the spectrum scarcity problem. In this paper we tackle the problem of... -
Secrecy Performance of Amplify-and-Forward Relay Networks with Relay Selection under Nakagami-m Fading
In this paper, we examine the secrecy outage performance of a dual-hop relay network under Nakagami- m fading. Here, we consider a three-terminal...
-
Secrecy Outage Performance Analysis of DF Cognitive Relay Network With Co-channel Interference
In this paper, we investigate the secrecy outage performance of the decode-and-forward cognitive relay network with the existence of the co-channel...
-
Secrecy and throughput performance of an energy harvesting hybrid cognitive radio network with spectrum sensing
In this paper, we evaluate the secrecy outage performance and throughput of a hybrid cognitive radio network, where a secondary user (SU) accesses...
-
Secure 5G downlink NOMA cognitive relay network: joint the impact of imperfect spectrum sensing and outdated CSI
This article studies the interweave cognitive network with non-orthogonal multiple access (NOMA) principle under the appearance of one eavesdropper....
-
A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks
Physical layer security (PLS) has cropped up as a promising solution to secure the wireless network. Cooperative communication is capable of...
-
Performance analysis for multi-RIS UAV NOMA mmWave communication systems
In this paper, an unmanned aerial vehicle (UAV) nonorthogonal multiple access (NOMA) system operating in millimeter-wave (mmWave) communications...
-
Evaluation of Physical Layer Security for UAV-Enabled Wireless Networks over \(\alpha -\kappa -\mu \) Fading Channels
Unmanned aerial vehicle (UAV)-enabled wireless systems are expected for widespread communication applications in future-generation networks because...
-
-
Energy harvesting relay selection and power allocation in cooperative secure NOMA networks with imperfect SIC over Nakagami-m channel
In this paper, we consider a cooperative non-orthogonal multiple access (NOMA) system with imperfect successive interference cancellation over...
-
On the Security of RF-Based IoT Network with Randomly Located Eavesdropper
Internet of Things (IoT) environments are comprised of a variety of electronic objects that transmit radio frequency (RF) signals. It further...