Articles with "secrecy" as a keyword



Photo by headwayio from unsplash

Secrecy Capacity Achievable Time Reversal Pre-filter in MISO Communication System and the Unequal Secrecy Protection Application

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-4787-x

Abstract: Classical time reversal (TR) pre-filtering has been considered as one of the key physical layer security techniques for wireless communication applications in the last decade. This paper proposes a secrecy capacity achievable time reversal pre-filter… read more here.

Keywords: reversal pre; communication; secrecy; secrecy capacity ... See more keywords
Photo by averey from unsplash

Secrecy Outage Analysis on Underlay Cognitive Radio System With Full-Duplex Secondary User

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2769131

Abstract: In this paper, an underlay cognitive radio system, which consists of a primary-user (PU) transmitter (TX), a PU receiver (RX), a secondary-user (SU) TX, and a SU_RX, is considered. Benefitting from the underlay mode, SU_TX… read more here.

Keywords: system; secrecy; secrecy outage; cognitive radio ... See more keywords
Photo by ale_s_bianchi from unsplash

Secrecy Analysis of Generalized Space-Shift Keying Aided Visible Light Communication

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2799658

Abstract: This paper investigates the physical layer security problem of visible light communication (VLC) systems relying on generalized space-shift keying (GSSK) termed as GSSK-VLC. The GSSK-VLC system considered is assumed to be comprised of three nodes:… read more here.

Keywords: light communication; secrecy; gssk vlc; visible light ... See more keywords
Photo by dawson2406 from unsplash

Performance Analysis of Secret Precoding-Aided Spatial Modulation With Finite-Alphabet Signaling

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2841027

Abstract: The precoding-aided spatial modulation (PSM) is first characterized with respect to its secrecy performance, which shows that the PSM is a secrecy embedded communication scheme when operated in the time-division duplex mode, but experiences security… read more here.

Keywords: secrecy; analysis; aided spatial; spatial modulation ... See more keywords
Photo from wikipedia

Performance Analysis of a Cache-Aided Wireless Heterogeneous Network With Secrecy Constraints

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3069736

Abstract: In this paper, we analyze the impact of caching on the performance of a cache enabled system with heterogeneous traffic where one of the users need to be served with confidential data. In this setup,… read more here.

Keywords: system; cache; performance; decoding schemes ... See more keywords
Photo by jordi_catalonia from unsplash

Evaluating Secrecy Outage of Physical Layer Security in Large-Scale MIMO Wireless Communications for Cyber-Physical Systems

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2017.2691352

Abstract: Large-scale multiple input multiple output (MIMO) wireless system is regarded as a solution to provide high speed connection for exponentially increasing wireless subscriptions for emerging cyber-physical systems (CPSs) and Internet of Things. In order to… read more here.

Keywords: secrecy; outage; mimo wireless; secrecy outage ... See more keywords
Photo by bradencollum from unsplash

Covertness and Secrecy Study in Untrusted Relay-Assisted D2D Networks

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3201021

Abstract: This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay ${R}$ . For… read more here.

Keywords: untrusted relay; relay assisted; covertness secrecy; rate ... See more keywords
Photo by acfb5071 from unsplash

Optimal Target Secrecy Rate and Power Allocation Policy for a SWIPT System Over a Fading Wiretap Channel

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2017.2691159

Abstract: The simultaneous wireless information and power transfer (SWIPT) technique is regarded as a promising approach to enhance performance of wireless networks with limited energy supply. However, due to the broadcast nature of wireless radio, the… read more here.

Keywords: secrecy; secrecy rate; power; target secrecy ... See more keywords
Photo by jancanty from unsplash

Comments on “AN-Aided Secrecy Precoding for SWIPT in Cognitive MIMO Broadcast Channels”

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2020.2965535

Abstract: Several gaps and errors in (B. Fang et al., “AN-aided secrecy precoding for SWIPT in cognitive MIMO broadcast channels,” IEEE Commun. Lett., vol. 19, no. 9, pp. 1632–1635, Sep. 2015) are identified. Their corrections as… read more here.

Keywords: precoding swipt; secrecy precoding; aided secrecy; swipt cognitive ... See more keywords
Photo from wikipedia

Impact of Mutual Influence Between Bob and Eve on the Secrecy of Diffusion-Based Molecular Timing Channels

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2022.3198276

Abstract: Secrecy in the context of molecular communication is a relatively unexplored area. The presence of an eavesdropping (Eve) unit in a molecular communication channel can pose a significant threat to the integrity of the information… read more here.

Keywords: diffusion based; mutual influence; bob eve; secrecy ... See more keywords
Photo from wikipedia

Artificial Noise Sheltered FH Broadcasting With Frequency Mismatch: Secrecy Analysis and Power Allocation

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Broadcasting"

DOI: 10.1109/tbc.2021.3110410

Abstract: To protect military broadcasting against both hostile interference and eavesdropping, an artificial noise (AN) sheltered frequency hopping (FH) broadcasting (ANS-FHB) architecture is proposed in this paper, and the secrecy capacity is employed to measure its… read more here.

Keywords: frequency; frequency mismatch; power; secrecy ... See more keywords