Articles with "secrecy performance" as a keyword



Photo by jordanmcdonald from unsplash

Secrecy outage analysis of double shadowed Rician channels

Sign Up to like & get
recommendations!
Published in 2019 at "Electronics Letters"

DOI: 10.1049/el.2019.0707

Abstract: The double shadowed Rician model was recently proposed to describe some realistic physical signal propagation phenomena, where a Rician faded signal is impacted by cascaded shadowing processes. In this Letter, the authors study the outage… read more here.

Keywords: performance; secrecy performance; double shadowed; outage performance ... See more keywords
Photo by jordanmcdonald from unsplash

Secrecy Performance Analysis of Mixed α − μ and Exponentiated Weibull RF-FSO Cooperative Relaying System

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3078610

Abstract: Increasing concerns regarding wireless systems’ security are leading researchers to exploit the physical properties of a medium while designing any secured wireless network. The secrecy performance of a mixed radio frequency-free space optical (RF-FSO) system… read more here.

Keywords: tex math; performance; secrecy performance; inline formula ... See more keywords
Photo from wikipedia

Impact of Self-Energy Recycling and Cooperative Jamming on SWIPT-Based FD Relay Networks with Secrecy Constraints

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3155498

Abstract: This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and power transfer cooperative relay network in the presence of an eavesdropper. The relay is considered to operate in full-duplex (FD) mode… read more here.

Keywords: self energy; energy; secrecy performance; energy recycling ... See more keywords
Photo by jordanmcdonald from unsplash

Accurate and Efficient Performance Prediction for Mobile IoV Networks Using GWO-GR Neural Network

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3152739

Abstract: The explosive growth of Internet of Vehicle (IoV) applications has made information security a significant issue. Mobile IoV users are dynamic and the communication environment is very complex, which makes it very difficult to guarantee… read more here.

Keywords: neural network; prediction; secrecy performance; mobile iov ... See more keywords
Photo by jareddrice from unsplash

Secrecy Performance of Backscatter Communications With Multiple Self-Powered Tags

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2022.3201031

Abstract: Backscatter communication (BackCom) networks are vulnerable to eavesdropping, while its secrecy performance has not been sufficiently studied. In this letter, we propose a tag selection strategy to optimize the ergodic secrecy capacity (ESC) and the… read more here.

Keywords: backscatter; secrecy capacity; self powered; secrecy performance ... See more keywords
Photo from wikipedia

Secrecy Performance of FSO Using HD and IM/DD Detection Technique Over F-Distribution Turbulence Channel With Pointing Error

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2021.3098305

Abstract: This work is concerned with the secrecy performance of a free-space optical (FSO) communication system over Fisher-Snedecor $\mathcal {F}$ -distribution turbulence fading channel. Considering the influence of pointing error, atmospheric turbulence and different detection technique… read more here.

Keywords: secrecy performance; detection; detection technique; turbulence ... See more keywords
Photo by headwayio from unsplash

Secrecy Performance Analysis of RIS-Aided Communication System With Randomly Flying Eavesdroppers

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2022.3198631

Abstract: In this letter, we analyze the secrecy performance of a reconfigurable intelligent surface (RIS)-aided communication system with spatially random unmanned aerial vehicles (UAVs) acting as eavesdroppers. We consider the scenarios where the base station (BS)… read more here.

Keywords: aided communication; ris aided; communication system; secrecy performance ... See more keywords
Photo from wikipedia

Secrecy Performance of Terrestrial Radio Links Under Collaborative Aerial Eavesdropping

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2019.2922353

Abstract: Motivated to understand the increasingly severe threat of unmanned aerial vehicles (UAVs) to the confidentiality of terrestrial radio links, this paper analyzes the ergodic and $\epsilon $ -outage secrecy capacities of the links in the… read more here.

Keywords: secrecy performance; radio links; terrestrial radio;
Photo by jordanmcdonald from unsplash

Secrecy Performance of an Idle Receiver Assisted Underlay Secondary Network

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2017.2698162

Abstract: In this letter, we derive an expression for the secrecy outage probability of a multiuser underlay downlink in which a selected idle secondary user serves as a friendly jammer to enhance physical-layer secrecy of secondary… read more here.

Keywords: tex math; secrecy performance; network; inline formula ... See more keywords
Photo by jordanmcdonald from unsplash

A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2019.2895639

Abstract: In this paper, we consider a centralized cooperative cognitive radio network (CCRN), where a primary base station sends a message to a primary user. Meanwhile, a secondary user transmitter (SU-Tx) acts as a friendly jammer… read more here.

Keywords: trust; secrecy performance; trust degree; friendly jammer ... See more keywords
Photo from wikipedia

Enhancing Secrecy Performance for STAR-RIS NOMA Networks

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2022.3213334

Abstract: Simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) is becoming a prospective technology in realizing extremely low power transmission and seamless coverage for the sixth generation (6G) wireless communication era. Motivated by this, we study… read more here.

Keywords: star ris; noma; performance; secrecy performance ... See more keywords