Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








414 Hits in 5.1 sec

Energy Harvesting for Physical-Layer Security in OFDMA Networks [article]

Meng Zhang, Yuan Liu
2015 arXiv   pre-print
splitting scheme to coordinate the energy harvesting and secrecy information decoding processes.  ...  In this paper, we study the simultaneous wireless information and power transfer (SWIPT) in downlink multiuser orthogonal frequency-division multiple access (OFDMA) systems, where each user applies power  ...  In [6] , artificial noise was considered for physical-layer security.  ... 
arXiv:1509.04442v1 fatcat:fazfcrk3ivfrxlkg3znokuj4bq

Energy Harvesting for Secure OFDMA Systems [article]

Meng Zhang, Yuan Liu, Suili Feng
2014 arXiv   pre-print
Energy harvesting and physical-layer security in wireless networks are of great significance.  ...  In this paper, we study the simultaneous wireless information and power transfer (SWIPT) in downlink orthogonal frequency-division multiple access (OFDMA) systems, where each user applies power splitting  ...  In [5] , the authors studied the energy-efficient for physical-layer security in multicarrier systems.  ... 
arXiv:1409.3635v1 fatcat:6mpwtomltvan5ezednxo4red54

Simultaneous Wireless Information and Power Transfer in Multi-User OFDMA Networks with Physical Secrecy

Pubet Sangmahamad, Kampol Woradit, Poompat Saengudomlert
2022 Sensors  
Application layer encryption is unsuitable for IoT nodes relying on energy harvesting, and physical layer secrecy should be deployed.  ...  of an IoT node and the energy harvesting efficiency.  ...  Practical IoT devices do not support complex encryption for information security, while physical secrecy is promising because the complex part is with the base station [13] .  ... 
doi:10.3390/s22103814 pmid:35632223 pmcid:PMC9146957 fatcat:grpevcnxfvex7iep6zwcteyawq

2013 Index

2014 IEEE Wireless Communications Letters  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  -that appeared in this periodical during 2013, and items from previous years that were commented upon or corrected in 2013.  ...  Lee, Junho, +, LWC June 2013 347-350 Performance Analysis for Physical Layer Security in Multi-Antenna Down-link Networks with Limited CSI Feedback.  ... 
doi:10.1109/twc.2011.09.097-wcl1402-index fatcat:uvzn7diievgtzaevj7eosb4zom

Secrecy Wireless Information and Power Transfer in OFDMA Systems [article]

Meng Zhang, Yuan Liu, Rui Zhang
2015 arXiv   pre-print
To enhance physical-layer security and yet satisfy energy harvesting requirements, we introduce a new frequency-domain artificial noise based approach.  ...  In this paper, we consider simultaneous wireless information and power transfer (SWIPT) in orthogonal frequency division multiple access (OFDMA) systems with the coexistence of information receivers (IRs  ...  In [16], ust transmission schemes for the multiple-input single-output (MISO) physical layer security is considered in SWIPT, AN not only improves secrecy inbut also becomes a new source for energy harvesting  ... 
arXiv:1509.00935v1 fatcat:7b3zfedko5efzlgbnkju6mppqa

2013 Index

2014 IEEE Transactions on Wireless Communications  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  -that appeared in this periodical during 2013, and items from previous years that were commented upon or corrected in 2013.  ...  Gonzalez G, David, +, TWC May 2013 2410-2423 Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach.  ... 
doi:10.1109/twc.2011.09.499-tw1401-index fatcat:w5ya5mg3sbcodb2crtuaoyk3su

Secure resource allocation for green two-way relay networks with mutually untrusted relay and mobile users

Fei Wang, Changchun Qin
2019 IET Networks  
The authors investigate secure resource allocation for an orthogonal frequency division multiple access two-way relay network, which has several pairs of mobile users (MUs) and one energy harvesting (EH  ...  In particular, to forward information for each MU, the relay adopts power splitting technique to harvest energy from radio frequency signals emitted by each MU.  ...  In the existing works, the physical layer security has been studied in two cases.  ... 
doi:10.1049/iet-net.2019.0002 fatcat:nnpfcwdiuzajrdrffgtiqkllbm

Energy-Efficient and Secure Resource Allocation for Multiple-Antenna NOMA with Wireless Power Transfer

Zheng Chang, Lei Lei, Huaqing Zhang, Tapani Ristaniemi, Symeon Chatzinotas, Bjorn Ottersten, Zhu Han
2018 IEEE Transactions on Green Communications and Networking  
With the consideration of an existing eavesdropper, the objective is to obtain secure and energy efficient transmission among multiple users by optimizing time, power and subchannel allocation.  ...  For some special cases, we identify the optimality condition that ensures the global optimum in our algorithm.  ...  In [30] , secure D2D communication in energy harvesting large-scale cognitive networks is explored.  ... 
doi:10.1109/tgcn.2018.2851603 dblp:journals/tgcn/ChangLZRCOH18 fatcat:gmj76fjbjjbzplj3odhs7fboli

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
Frequency) energy harvesting and other physical layer issues related to 5G.  ...  Fig. 17. 5G Network Security in Physical Layer. A. OFDMA and Non Orthogonal Multiple Access (NOMA) Fig. 18. Security challenges and solutions for OFDMA PLS.  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems

Meng Zhang, Yuan Liu, Rui Zhang
2016 IEEE Transactions on Wireless Communications  
To enhance the physical layer security for IRs and yet satisfy energy harvesting requirements for ERs, we propose a new frequency domain artificial noise (AN) aided transmission strategy.  ...  In this paper, we study simultaneous wireless information and power transfer (SWIPT) in orthogonal frequency division multiple access (OFDMA) systems with the coexistence of information receivers (IRs)  ...  Hence, under such multi-layer security framework, it is also possible to jointly consider the key-assisted physical-layer security and cryptography design, which is left for our future work.  ... 
doi:10.1109/twc.2016.2516528 fatcat:gbsugmcflfegxmb5dk3fe5wfj4

Table of Contents

2016 IEEE Transactions on Vehicular Technology  
Leung 6244 Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Wang 6232 Mitigation of Uplink ICI and IBI in OFDMA Two-Tier Networks . . . . . . . . . . . . H. Wang, R. Song, and S.-H.  ... 
doi:10.1109/tvt.2016.2596323 fatcat:hc6khw4qpnherap6r2g6phsfxi

Table of contents

2018 IEEE Communications Letters  
Zhang 2487 Physical Layer Security For Dual-Hop VLC/RF Communication Systems ................................................... ................................................................... Z.  ...  Wang 2539 WIRELESS NETWORKS Sensing Strategy Exploiting Channel Memory in CR Network With RF Energy Harvesting .............................. ...........................................................  ... 
doi:10.1109/lcomm.2018.2882050 fatcat:fklsut3t2fc65eob7mpxsrclti

Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges [article]

Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro
2020 arXiv   pre-print
We explore the vulnerabilities of EH networks, and we provide a comprehensive overview of the scientific literature, including attack vectors, cryptography techniques, physical-layer security schemes for  ...  data secrecy, and additional physical-layer countermeasures.  ...  The information and views set out in this publication are those of the authors and do not necessarily reflect the official opinion of the QNRF.  ... 
arXiv:2004.10394v2 fatcat:o4iwqkcdvfgmtjmwmxgvrbt3je

A Survey on Integrated Sensing, Communication, and Computing Networks for Smart Oceans

Minghui Dai, Yang Li, Peichun Li, Yuan Wu, Liping Qian, Bin Lin, Zhou Su
2022 Journal of Sensor and Actuator Networks  
four domains (i.e., space layer, aerial layer, sea surface layer, and underwater layer), and five aspects (i.e., sensing-related, communication-related, computation-related, security-related, and application-related  ...  In this paper, we conduct a comprehensive survey on the integrated sensing, communication, and computing networks (ISCCNs) for smart oceans based on the collaboration of space–air–ground–sea networks from  ...  In [139] , the authors presented a novel localization technique for energy-harvesting hybrid acoustic-optical underwater wireless sensor networks.  ... 
doi:10.3390/jsan11040070 fatcat:ypxapijbgnfz7hlf7vxfptuu5a

Multiple Access in Cognitive Radio Networks: From Orthogonal and Non-Orthogonal to Rate-Splitting

Safaa Gamal, Mohamed Rihan, Saleh Hussin, Adel Zaghloul, A. Abdelaziz Salem
2021 IEEE Access  
) networks becomes insufficient to guarantee the satisfaction of main network requirements in terms of spectrum efficiency (SE), scalability, delay, and energy efficiency (EE).  ...  Due to the increasingly complicated communication scenarios and network architectures as well as growing traffic demands for high speed connectivity, dynamic spectrum allocation in fifth generation (5G  ...  The interest in physical layer security grows increasingly in the last few years, especially with the lunching of 5G systems with its massive connectivity scenarios.  ... 
doi:10.1109/access.2021.3095142 fatcat:5xjw7gkdonbyne3geehqo7hrqq
« Previous Showing results 1 — 15 out of 414 results