We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,324 results
  1. Secrecy Capacity Analysis Using Nonlinear Transmissions for Physical Layer Security

    In this paper, physical layer security is investigated, which is characterized by utilizing the physical layer characteristics to achieve secure...

    Jieling Wang, Zhiqian Wang, ... Yejun Zhou in Wireless Personal Communications
    Article 01 May 2024
  2. Secrecy capacity of scheduled TAS scheme over non-identical nakagami fading channels

    The purpose of this work is to perform the generalized secrecy capacity (i.e., secrecy rate and secrecy outage capacity) analysis of the scheduled...

    Donghun Lee in Wireless Networks
    Article 16 December 2023
  3. Ergodic Secrecy Capacity of Cooperative NOMA System with Untrusted User

    Non-orthogonal multiple access (NOMA) technique can potentially increase spectral efficiency and improve the network capacity of wireless networks....

    Saif Ahmad, Mohd Javed Khan in Wireless Personal Communications
    Article 24 November 2023
  4. Secrecy Outage Probability and Strictly Positive Secrecy Capacity of Cognitive Radio Networks with Adaptive Transmit Power

    In this article, we derive the Secrecy Outage Probability (SOP) and the Probability of Strictly Positive Secrecy Capacity (SPSC) for Cognitive Radio...

    Article 11 March 2023
  5. Ergodic secrecy capacity of backscatter communication based automatic toll collection systems

    Automatic toll collection systems have been known to operate with a backscatter mechanism. Such systems are highly prone to eavesdrop** despite the...

    Hemant Kumar Sharma, Brijesh Kumbhani in Sādhanā
    Article 05 May 2023
  6. Enhancement of PLS Model of Massive MIMO by Detecting Eavesdrop Attacks and Improving the Secrecy Capacity of the System Based on Optimization Strategy

    Physical layer security (PLS) is becoming an interesting subject since it guarantees to deliver the most consistent and secure communication in...

    Chanchal Soni, Namit Gupta in Wireless Personal Communications
    Article 25 February 2023
  7. Secrecy of Molecular Communication in Presence of Radiation Absorption

    Ultra high user density is one of the key requirements in 6G and beyond. Also, in future, THz based communication system and Molecular Communication...

    Saket Mishra, Urvashi Chugh, ... Ghanshyam Singh in Wireless Personal Communications
    Article 09 July 2024
  8. Ergodic Secrecy Capacity Analysis Over Composite Weibull/Inverse Gamma Fading Channel

    In this work, the secrecy performance of traditional Wyner’s model over more realistic composite wireless fading channel, i.e., Weibull/Inverse...
    Vipin Kumar Upaddhyay, Puspraj Singh Chauhan, Sanjay Kumar Soni in VLSI, Microwave and Wireless Technologies
    Conference paper 2023
  9. Secrecy Performance of Multi-RIS-Assisted Wireless Systems

    This paper presents a theoretical framework using multiple reconfigurable intelligent surfaces (RISs) for enhancing the secrecy performance of...

    Ba Cao Nguyen, Quyet-Nguyen Van, ... Gia Thien Luu in Mobile Networks and Applications
    Article 10 June 2023
  10. Secrecy performance analysis of IRS-NOMA systems

    In this paper, we propose to utilize an intelligent reflecting surface (IRS) as a promising technology to enhance the coverage and physical layer...

    Hossein Ghavami, Bahareh Akhbari in EURASIP Journal on Wireless Communications and Networking
    Article Open access 03 July 2023
  11. Secrecy capacity in two-way energy harvesting relay networks with a friendly jammer

    This paper considers secure two-way relay communications in the presence of an eavesdropper. Two users without a direct link between them communicate...

    Maymoona Hayajneh, T. Aaron Gulliver in Wireless Networks
    Article 14 August 2021
  12. Secrecy Performance of Maximum Ratio Transmission with Correlated Main and Eavesdropper Channels

    To investigate the effect of the correlation between main channel and eavesdrop** channel on the secrecy performance of the wireless communication...

    Chang Yuqing, Rui **anyi in Wireless Personal Communications
    Article 24 June 2022
  13. Secrecy Outage of an Energy Harvesting Multi-relay Network with Multiple-antenna

    Secrecy performance of a cooperative communication network is analyzed in which source transmits information to a destination via multiple relays,...

    Shashibhushan Sharma, Sanjay Dhar Roy, Sumit Kundu in Wireless Personal Communications
    Article 23 March 2023
  14. Secrecy Enhancement in AF Relaying Assisted SWIPT-NOMA via Power Optimization and Control-Jamming

    This work aims at achieving the secrecy rate (SR) enhancement in amplify-and-forward (AF) relay-aided simultaneous wireless information and power...

    V. Narasimha Nayak, Kiran Kumar Gurrala in Wireless Personal Communications
    Article 01 March 2024
  15. On secrecy performance analysis of multi-antenna STAR-RIS-assisted downlink NOMA systems

    To accommodate the stringent requirements of enhanced coverage quality and improved spectral efficiency, simultaneous transmitting and reflecting...

    Shu Xu, Chen Liu, ... ** Li in EURASIP Journal on Advances in Signal Processing
    Article Open access 05 December 2022
  16. An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels

    Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the...

    Long Kong, Yun Ai, ... Björn Ottersten in EURASIP Journal on Wireless Communications and Networking
    Article Open access 04 December 2021
  17. Applications in AIoT: IoT Security and Secrecy

    Besides distributed learning discussed in Chap. 8 , applications and platforms including cloud computing,...
    Chapter 2023
  18. Analysis of secrecy outage performance for full duplex NOMA relay systems with appearance of multiple eavesdroppers

    Full-duplex (FD) relay systems including a transmit antenna selection and a non-orthogonal multiple access (NOMA) methods are analyzed under presence...

    Nguyen Le Cuong, Tran Manh Hoang, ... Pham Thanh Hiep in Wireless Networks
    Article 28 June 2022
  19. Secrecy Capacity Analysis of Cooperative Vehicular Amplify-and-Forward Relay Networks

    We exploit the physical layer security aspects to secure a dual-hop cooperative vehicular relaying networks (CVRNs), where a fixed source node sends...
    Anshul Pandey, Suneel Yadav in Soft Computing and Signal Processing
    Conference paper 2022
  20. Secrecy Trade-off at the Physical Layer over Mixed Fading Multicast Channels Employing Antenna Diversity

    This paper deals with the secrecy performance analysis of a multicast network over mixed fading scenarios in which a cluster of passive eavesdroppers...

    A. S. M. Nafis, A. S. M. Badrudduza, ... M. Z. I. Sarkar in Wireless Personal Communications
    Article 28 September 2021
Did you find what you were looking for? Share feedback.