Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Access"
DOI: 10.1109/access.2017.2691003
Abstract: The open nature of radio propagation makes wireless transmissions exposed to unauthorized users and become vulnerable to both the jamming and eavesdropping attacks. In industrial environments, wireless transmissions are also adversely affected by the presence…
read more here.
Keywords:
reliability;
security reliability;
wireless;
wireless sensor ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2019.2923273
Abstract: This paper investigates the physical-layer security (PLS) of wireless transmissions with the aid of multiple decode-and-forward one-way relays in the presence of both eavesdropping attacks and channel estimation errors (CEEs). To protect wireless transmission with…
read more here.
Keywords:
cee;
security reliability;
security;
cee prs ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2023.3327577
Abstract: In this article, we analyze the security and reliability tradeoff (SRT) performance of a unmanned aerial vehicle (UAV) relays assisted cognitive network consisting of a cognitive source (S), multiple cognitive UAV relays (Rs), a cognitive…
read more here.
Keywords:
uav relays;
relay;
srt performance;
reliability tradeoff ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2024.3372185
Abstract: The Internet of Things (IoT) is a rapidly growing network of interconnected devices that has the potential to revolutionize many industries and sectors. However, IoT devices are often vulnerable to security and reliability threats due…
read more here.
Keywords:
secure reliable;
sar crn;
iot;
security reliability ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2025.3543100
Abstract: In this letter, we study an Industrial Internet of Things network comprising two legitimate sensors and a single eavesdropper, where both reliability and security of transmissions must be guaranteed. By addressing the tradeoff between reliability…
read more here.
Keywords:
reliability performance;
joint security;
reliability;
optimization ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"
DOI: 10.1109/tcad.2022.3199172
Abstract: The growing integrated circuit complexity has led to a compelling need for design efficiency improvement through new electronic design automation (EDA) methodologies. In recent years, many unprecedented efficient EDA methods have been enabled by machine…
read more here.
Keywords:
dark side;
reliability concerns;
machine learning;
reliability ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2024.3469213
Abstract: This paper analyzes the security and reliability tradeoff (SRT) performance for a hybrid satellite-terrestrial network (HSTN) using the non-orthogonal multiple access (NOMA) protocol. To improve the SRT performance of the NOMA based HSTN, a friendly…
read more here.
Keywords:
friendly jammer;
noma;
jammer;
security reliability ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Wireless Communications"
DOI: 10.1109/twc.2021.3079902
Abstract: In this paper, we investigate the security and reliability trade-off (SRT) for a wireless sensor network (WSN) which consists of one cluster head (CH), multiple users, and one eavesdropper (E), where the eavesdropper attempts to…
read more here.
Keywords:
scheme;
reliability trade;
security;
security reliability ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "China Communications"
DOI: 10.23919/jcc.ea.2021-0744.202401
Abstract: This paper investigates the security and reliability of information transmission within an underlay wiretap energy harvesting cognitive two-way relay network. In the network, energy-constrained secondary network (SN) nodes harvest energy from radio frequency signals of…
read more here.
Keywords:
energy;
energy harvesting;
network;
security ... See more keywords