Search
Search Results
-
Secrecy Outage Probability and Strictly Positive Secrecy Capacity of Cognitive Radio Networks with Adaptive Transmit Power
In this article, we derive the Secrecy Outage Probability (SOP) and the Probability of Strictly Positive Secrecy Capacity (SPSC) for Cognitive Radio...
-
Ergodic Secrecy Capacity of Cooperative NOMA System with Untrusted User
Non-orthogonal multiple access (NOMA) technique can potentially increase spectral efficiency and improve the network capacity of wireless networks....
-
On the Security of RF-Based IoT Network with Randomly Located Eavesdropper
Internet of Things (IoT) environments are comprised of a variety of electronic objects that transmit radio frequency (RF) signals. It further... -
Evaluation of Physical Layer Security for UAV-Enabled Wireless Networks over \(\alpha -\kappa -\mu \) Fading Channels
Unmanned aerial vehicle (UAV)-enabled wireless systems are expected for widespread communication applications in future-generation networks because...
-
Semi-blind AF transmission in secure NOMA systems
In the wireless channel state information (CSI)-assisted amplify-and-forward (AF) networks, an instantaneous CSI of the first hop is required to...
-
Physical Layer Security of Non Orthogonal Multiple Access Using Reconfigurable Intelligent Surfaces
In this paper, we propose to improve the physical layer security of non orthogonal multiple access (NOMA) using reconfigurable intelligent surfaces...
-
On Physical Layer Security of Double Shadowed Rician Fading Channels
With the proliferation of fifth-generation (5G) mobile communication wireless networks, the investigation into the performance of physical layer...
-
Physical Layer Security Enhancement Using Reconfigurable Intelligent Surfaces and Multi-antenna Energy Harvesting
In this article, we suggest enhancing the physical layer security of wireless systems using reconfigurable intelligent surfaces (RIS). We compute the...
-
Secure Communication for RF Energy Harvesting NOMA Relaying Networks with Relay-User Selection Scheme and Optimization
In this paper, we study the physical layer security (PLS) of a radio frequency energy harvesting (RF EH) non-orthogonal multiple access (NOMA)...
-
Satellite-UAV Communications
This section considers a dual-hop cooperative satellite-UAV communication system including a satellite (S) and a group of cluster headers (CHs),... -
A Review of Transmission Rate over Wireless Fading Channels: Classifications, Applications, and Challenges
To address the explosive traffic demands, the capacity of the fading channel is increasingly becoming a prime concern in the designing of the...
-
Physical Layer Security Performance of Mobile Vehicular Networks
Vehicular communication is an emergent technology with promising future, which can promote the development of mobile vehicular networks. Due to the...
-
Survey on physical layer security for 5G wireless networks
Physical layer security is a promising approach that can benefit traditional encryption methods. The idea of physical layer security is to take...
-
Impact of Untrusted Relay on Physical Layer Security in Non-Orthogonal Multiple Access Networks
In this study, the wireless sensor network is investigated in scenario of untrusted relay required to user at far distance. In particular, an...
-
Machine learning-based physical layer security: techniques, open challenges, and applications
Wireless physical layer security (WPLS) is a powerful technology for current and emerging mobile networks. Physical layer authentication (PLA),...
-
Impact of Feedback Errors on the Security of MIMO Wiretap Systems with Antenna Selection
This paper analyzes the impact of feedback errors on the security performances of multiple-input multiple-output (MIMO) wiretap channels. For the...
-
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks
The 5G networks have the capability to provide high compatibility for the new applications, industries, and business models. These networks can...