Sign Up to like & get
recommendations!
0
Published in 2017 at "Wireless Personal Communications"
DOI: 10.1007/s11277-017-4787-x
Abstract: Classical time reversal (TR) pre-filtering has been considered as one of the key physical layer security techniques for wireless communication applications in the last decade. This paper proposes a secrecy capacity achievable time reversal pre-filter…
read more here.
Keywords:
reversal pre;
communication;
secrecy;
secrecy capacity ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Access"
DOI: 10.1109/access.2017.2769131
Abstract: In this paper, an underlay cognitive radio system, which consists of a primary-user (PU) transmitter (TX), a PU receiver (RX), a secondary-user (SU) TX, and a SU_RX, is considered. Benefitting from the underlay mode, SU_TX…
read more here.
Keywords:
system;
secrecy;
secrecy outage;
cognitive radio ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2799658
Abstract: This paper investigates the physical layer security problem of visible light communication (VLC) systems relying on generalized space-shift keying (GSSK) termed as GSSK-VLC. The GSSK-VLC system considered is assumed to be comprised of three nodes:…
read more here.
Keywords:
light communication;
secrecy;
gssk vlc;
visible light ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2841027
Abstract: The precoding-aided spatial modulation (PSM) is first characterized with respect to its secrecy performance, which shows that the PSM is a secrecy embedded communication scheme when operated in the time-division duplex mode, but experiences security…
read more here.
Keywords:
secrecy;
analysis;
aided spatial;
spatial modulation ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3069736
Abstract: In this paper, we analyze the impact of caching on the performance of a cache enabled system with heterogeneous traffic where one of the users need to be served with confidential data. In this setup,…
read more here.
Keywords:
system;
cache;
performance;
decoding schemes ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2017.2691352
Abstract: Large-scale multiple input multiple output (MIMO) wireless system is regarded as a solution to provide high speed connection for exponentially increasing wireless subscriptions for emerging cyber-physical systems (CPSs) and Internet of Things. In order to…
read more here.
Keywords:
secrecy;
outage;
mimo wireless;
secrecy outage ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3201021
Abstract: This article investigates the covertness and secrecy of wireless communications in an untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base station (BS), a user equipment (UE), and an untrusted relay ${R}$ . For…
read more here.
Keywords:
untrusted relay;
relay assisted;
covertness secrecy;
rate ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2017.2691159
Abstract: The simultaneous wireless information and power transfer (SWIPT) technique is regarded as a promising approach to enhance performance of wireless networks with limited energy supply. However, due to the broadcast nature of wireless radio, the…
read more here.
Keywords:
secrecy;
secrecy rate;
power;
target secrecy ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2020.2965535
Abstract: Several gaps and errors in (B. Fang et al., “AN-aided secrecy precoding for SWIPT in cognitive MIMO broadcast channels,” IEEE Commun. Lett., vol. 19, no. 9, pp. 1632–1635, Sep. 2015) are identified. Their corrections as…
read more here.
Keywords:
precoding swipt;
secrecy precoding;
aided secrecy;
swipt cognitive ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2022.3198276
Abstract: Secrecy in the context of molecular communication is a relatively unexplored area. The presence of an eavesdropping (Eve) unit in a molecular communication channel can pose a significant threat to the integrity of the information…
read more here.
Keywords:
diffusion based;
mutual influence;
bob eve;
secrecy ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Broadcasting"
DOI: 10.1109/tbc.2021.3110410
Abstract: To protect military broadcasting against both hostile interference and eavesdropping, an artificial noise (AN) sheltered frequency hopping (FH) broadcasting (ANS-FHB) architecture is proposed in this paper, and the secrecy capacity is employed to measure its…
read more here.
Keywords:
frequency;
frequency mismatch;
power;
secrecy ... See more keywords