Articles with "secrecy rate" as a keyword



Photo by markusspiske from unsplash

Secrecy Capacity of Two-Hop Relay Assisted Wiretap Channels

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3754-2

Abstract: Incorporating the physical layer characteristics to secure communications has received considerable attention in recent years. Moreover, cooperation with some nodes of network can give benefits of multiple-antenna systems, increasing the secrecy capacity of such channels.… read more here.

Keywords: secrecy rate; secrecy capacity; capacity; relay ... See more keywords
Photo by hudsoncrafted from unsplash

Secure Transmission With Aid of a Helper for MIMOME Network Having Finite Alphabet Inputs

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2671878

Abstract: This paper considers secure transmission with the aid of a helper for finite alphabet signals in multiple-input–multiple-output multiple antenna eavesdropper networks, where the helper transmits a jamming signal along with the confidential message sent by… read more here.

Keywords: secure transmission; helper; ergodic secrecy; secrecy rate ... See more keywords
Photo by mbrunacr from unsplash

Secrecy Rate Optimization for Cooperative Cognitive Radio Networks Aided by a Wireless Energy Harvesting Jammer

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2850846

Abstract: In this paper, a novel wireless energy harvesting cooperative jammer (EH-CJ)-aided transmission scheme, which can enhance the security for cooperative cognitive radio networks (CCRNs), is proposed. The EH-CJ first harvests energy from ambient radio frequency… read more here.

Keywords: energy; radio; secrecy rate; wireless energy ... See more keywords
Photo by azarbadam from unsplash

Secrecy Rate Analysis of Opportunistic User Scheduling in Uplink Networks With Potential Eavesdroppers

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2939048

Abstract: In this paper, we investigate two user scheduling algorithms (optimal user and threshold-based user scheduling algorithms) when we consider potential eavesdroppers in an uplink wiretap network. The optimal user scheduling (OUS) algorithm selects the user… read more here.

Keywords: tus; rate; potential eavesdroppers; user scheduling ... See more keywords
Photo by hakannural from unsplash

Cooperative Beamforming With Artificial Noise Injection for Physical-Layer Security

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3252503

Abstract: In the sixth-generation (6G) communications, how to deploy and manage massively connected Internet-of-Things (IoT) nodes will be one of the key technical challenges, because 6G is expected to provide 10 times higher connection, compared to… read more here.

Keywords: secrecy rate; based pls; injection; security ... See more keywords
Photo by scottwebb from unsplash

Security Analysis of QAM Quantum-Noise Randomized Cipher System

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Photonics Journal"

DOI: 10.1109/jphot.2020.3009252

Abstract: Applying the quadrature amplitude modulation (QAM) format, quantum-noise randomized cipher (QNRC) systems hide the signal states in quantum phase noise and amplitude noise to prevent eavesdropping. In this paper, based on the traditional wire-tap channel… read more here.

Keywords: qam; system; security; noise ... See more keywords
Photo from wikipedia

Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Journal on Selected Areas in Communications"

DOI: 10.1109/jsac.2018.2825158

Abstract: Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as an effective solution to provide large coverage and dynamic capacity for both military and civilian applications, especially in unexpected scenarios. However, because of their… read more here.

Keywords: secrecy rate; mat hardcore; hardcore point; uav enabled ... See more keywords
Photo by acfb5071 from unsplash

Optimal Target Secrecy Rate and Power Allocation Policy for a SWIPT System Over a Fading Wiretap Channel

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2017.2691159

Abstract: The simultaneous wireless information and power transfer (SWIPT) technique is regarded as a promising approach to enhance performance of wireless networks with limited energy supply. However, due to the broadcast nature of wireless radio, the… read more here.

Keywords: secrecy; secrecy rate; power; target secrecy ... See more keywords
Photo from wikipedia

Secrecy Rate Analysis for Pilot Contamination Attacks in Massive MIMO With Limited RF Chains

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2018.2861402

Abstract: Pilot contamination attacks in training-based massive multiple-input multiple-output systems with limited radio-frequency chains are investigated. A lower bound for the achievable secrecy rate in the presence of a multi-antenna active eavesdropper is derived in closed-form.… read more here.

Keywords: contamination attacks; pilot contamination; secrecy rate; rate ... See more keywords
Photo by shapelined from unsplash

Multicast Secrecy Rate Maximization for Reconfigurable Intelligent Surface Backscatter Communication

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2022.3208018

Abstract: This letter innovatively studies a reconfigurable intelligent surface (RIS) backscatter multicast secrecy communication system. In this system, a RIS acts as a transmitter to multicast confidential information for multiple single-antenna legitimate users by the backscatter… read more here.

Keywords: intelligent surface; secrecy rate; backscatter; reconfigurable intelligent ... See more keywords
Photo by thoughtcatalog from unsplash

Exact Secrecy Rate Analysis of Randomized Radiation Technique With Frequency Diverse Subarrays

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2022.3212373

Abstract: Frequency diverse subarrays (FDSA) can provide angle-range-dependent beam steering by introducing different frequency offset increments to subarrays. Such selectivity in the angle-range dimension can be exploited for physical layer security by suppressing the information leakage… read more here.

Keywords: frequency diverse; secrecy rate; diverse subarrays; rate ... See more keywords