Sign Up to like & get
recommendations!
0
Published in 2019 at "Electronics Letters"
DOI: 10.1049/el.2019.0707
Abstract: The double shadowed Rician model was recently proposed to describe some realistic physical signal propagation phenomena, where a Rician faded signal is impacted by cascaded shadowing processes. In this Letter, the authors study the outage…
read more here.
Keywords:
performance;
secrecy performance;
double shadowed;
outage performance ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3078610
Abstract: Increasing concerns regarding wireless systems’ security are leading researchers to exploit the physical properties of a medium while designing any secured wireless network. The secrecy performance of a mixed radio frequency-free space optical (RF-FSO) system…
read more here.
Keywords:
tex math;
performance;
secrecy performance;
inline formula ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3155498
Abstract: This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and power transfer cooperative relay network in the presence of an eavesdropper. The relay is considered to operate in full-duplex (FD) mode…
read more here.
Keywords:
self energy;
energy;
secrecy performance;
energy recycling ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3361038
Abstract: Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two technologies witnessed to offer tremendous possibilities for the next generation wireless networks to maximise their usage of available spectrum. In this work, we evaluate the…
read more here.
Keywords:
performance;
noma system;
downlink;
secrecy performance ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3152739
Abstract: The explosive growth of Internet of Vehicle (IoV) applications has made information security a significant issue. Mobile IoV users are dynamic and the communication environment is very complex, which makes it very difficult to guarantee…
read more here.
Keywords:
neural network;
prediction;
secrecy performance;
mobile iov ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2022.3201031
Abstract: Backscatter communication (BackCom) networks are vulnerable to eavesdropping, while its secrecy performance has not been sufficiently studied. In this letter, we propose a tag selection strategy to optimize the ergodic secrecy capacity (ESC) and the…
read more here.
Keywords:
backscatter;
secrecy capacity;
self powered;
secrecy performance ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2021.3098305
Abstract: This work is concerned with the secrecy performance of a free-space optical (FSO) communication system over Fisher-Snedecor $\mathcal {F}$ -distribution turbulence fading channel. Considering the influence of pointing error, atmospheric turbulence and different detection technique…
read more here.
Keywords:
secrecy performance;
detection;
detection technique;
turbulence ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2022.3198631
Abstract: In this letter, we analyze the secrecy performance of a reconfigurable intelligent surface (RIS)-aided communication system with spatially random unmanned aerial vehicles (UAVs) acting as eavesdroppers. We consider the scenarios where the base station (BS)…
read more here.
Keywords:
aided communication;
ris aided;
communication system;
secrecy performance ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2024.3361379
Abstract: This letter proposes a best node and random jammer (bN-rJ) scheme for multi-hop Internet-of-Things (IoT) networks under imperfect channel state information (CSI) and non-colluding eavesdroppers. Approximate and asymptotic closed-form expressions for the secrecy block-error rate…
read more here.
Keywords:
networks imperfect;
iot networks;
csi;
imperfect csi ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2025.3594264
Abstract: Existing works on the physical layer security of wirelessly powered backscatter communications (WPBC) have mainly focused on secrecy outage probability and secrecy ergodic capacity. However, these performance metrics cannot reflect the security performance when Shannon’s…
read more here.
Keywords:
backscatter communications;
performance;
partial secrecy;
wirelessly powered ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Green Communications and Networking"
DOI: 10.1109/tgcn.2024.3365692
Abstract: Reconfigurable intelligent surface (RIS) and ambient backscatter communication (AmBC) have been envisioned as two promising technologies due to their high transmission reliability as well as energy-efficiency. This paper investigates the secrecy performance of RIS assisted…
read more here.
Keywords:
ambc networks;
ambient backscatter;
ris assisted;
ris ... See more keywords