Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








284 Hits in 5.0 sec

Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks

Van-Dinh Nguyen, Trung Q. Duong, Octavia A. Dobre, Oh-Soon Shin
2016 IEEE Transactions on Information Forensics and Security  
ACKNOWLEDGMENT The authors are grateful to the anonymous reviewers and the Editor, Prof. N. Kiyavash, for their constructive comments.  ...  By utilizing the zero-forcing method to eliminate the interference caused by JN to the secondary user, we study the joint optimization of the information and JN beamforming for secrecy rate maximization  ...  For the present problem, we consider the joint optimization of information and JN beamforming to maximize the secrecy rate subject to per-antenna power constraints (PAPCs) at the secondary transmitter  ... 
doi:10.1109/tifs.2016.2594131 fatcat:3ncq6lnymveu5gddudosowwqta

A Survey of Optimization Approaches for Wireless Physical Layer Security [article]

Dong Wang, Bo Bai, Wenbo Zhao, Zhu Han
2019 arXiv   pre-print
The research on physical layer security mainly focuses either on the secrecy capacity/achievable secrecy rate/capacity-equivocation region from the perspective of information theory, or on the security  ...  Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry.  ...  wireless information and power transfer are raised in cognitive radio networks in [238] , [239] .  ... 
arXiv:1901.07955v1 fatcat:3pb27rlc45c3dmnjgwmjyspvb4

Introduction to the Issue on Signal Processing for Exploiting Interference Toward Energy Efficient and Secure Wireless Communications

Ioannis Krikidis, Christos Masouros, Gan Zheng, Rui Zhang, Robert Schober
2016 IEEE Journal on Selected Topics in Signal Processing  
They present an artificial-noise approach based on rank-two beamforming to maximize the sum secrecy rate.  ...  The seventh article by Cumanan et. al. proposes a secrecy rate optimization framework for multicasting secrecy networks with cooperative jamming.  ... 
doi:10.1109/jstsp.2016.2620703 fatcat:o4co3sihxzecrkscrdttjm5m3q

Secure Non-Orthogonal Multiple Access: An Interference Engineering Perspective [article]

Lu Lv, Hai Jiang, Zhiguo Ding, Qiang Ye, Naofal Al-Dhahir, Jian Chen
2020 arXiv   pre-print
Furthermore, we propose interference engineering strategies for more advanced full-duplex NOMA, intelligent reflecting surface NOMA, cognitive radio NOMA, and multi-cell NOMA networks, and discuss several  ...  In this article, we unleash the potential of network interference and exploit it constructively to enhance physical-layer security in NOMA networks.  ...  in full-duplex NOMA, intelligent reflecting surface (IRS) NOMA, cognitive radio NOMA, and multi-cell NOMA networks.  ... 
arXiv:2003.13488v2 fatcat:zi66mus2dbhq3djgmzczb3tenm

Joint Beamforming and Jamming Optimization for Secure Transmission in MISO-NOMA Networks

Nan Zhao, Wei Wang, Jingjing Wang, Yunfei Chen, Yun Lin, Zhiguo Ding, Norman C. Beaulieu
2019 IEEE Transactions on Communications  
In the first scheme, the transmit power of artificial jamming is maximized, with its received power at each receiver higher than that of other users.  ...  Simulation results are presented to show the effectiveness of the proposed schemes in guaranteeing the security of NOMA networks.  ...  JOINT BEAMFORMING AND JAMMING OPTIMIZATION To guarantee the security of the MISO-NOMA network with legitimate transmission is not affected, in this section, we propose a joint beamforming and jamming optimization  ... 
doi:10.1109/tcomm.2018.2883079 fatcat:52shtoowwjc7do4m2cmzrjahhm

RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey [article]

Majid H. Khoshafa, Omar Maraqa, Jules M. Moualeu, Sylvester Aboagye, Telex M. N. Ngatched, Mohamed H. Ahmed, Yasser Gadallah, Marco Di Renzo
2024 arXiv   pre-print
However, the evolution towards the 5G technology and beyond poses new security challenges that must be addressed in order to fulfill the unprecedented performance requirements of future wireless networks  ...  Consequently, the RIS technology can be adopted to improve the information-theoretic security of both RF and OWC systems.  ...  The authors in [214] focused on employing an active RIS in a secure cognitive satellite-terrestrial network to optimize the secrecy rate.  ... 
arXiv:2403.10412v1 fatcat:yjnv3tiarnh4lpwxyam2qtpvqe

Wireless Physical Layer Security with Imperfect Channel State Information: A Survey [article]

Biao He, Xiangyun Zhou, Thushara D. Abhayapala
2013 arXiv   pre-print
nodes or in cognitive radio systems.  ...  The recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, the open problems for the on-going and future research are discussed.  ...  for multi-antenna channels, and other signaling designs for relay channels or cognitive radio systems.  ... 
arXiv:1307.4146v2 fatcat:nvho2lziqjep5my2zlibtk6hpm

Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks

2020 KSII Transactions on Internet and Information Systems  
Simulation results show that the scheme achieves the maximum SD secrecy rate with appropriate selection of power splitting ratio, and the proposed scheme guarantees security in cognitive SWIPT networks  ...  Beamforming vector and power splitting ratio are jointly optimized with the objective of SU secrecy capacity maximization.  ...  Under the power constraint of secondary user, the joint power split ratio and beamforming design is studied to maximize the secret information transmission rate to the secondary destination.  ... 
doi:10.3837/tiis.2020.01.001 fatcat:aerha42mergploxuuncitaiukm

Securing Internet of Medical Things with Friendly-jamming schemes

Xuran Li, Hong-Ning Dai, Qubeijian Wang, Muhammad Imran, Dengwang Li, Muhammad Ali Imran
2020 Computer Communications  
We also discuss the integration of Fri-jam schemes with various communication technologies, including beamforming, Simultaneous Wireless Information and Power Transfer (SWIPT) and full duplexity.  ...  However, security and privacy become the main concerns of IoMT due to the limited computational capability, memory space and energy constraint of medical sensors, leading to the in-feasibility for conventional  ...  [63] proposed the joint optimization strategy of the information signals and beamforming of Fri-jam signals to maximize the secrecy rate considering MISO broadcast channel in an underlay cognitive radio  ... 
doi:10.1016/j.comcom.2020.06.026 pmid:32834198 pmcid:PMC7318968 fatcat:extnitk2yreifo2z2j7ua5a2ey

Secrecy Rate Optimization for RF Powered Two-Hop Untrusted Relay Networks with Non-Linear EH Model

Xiaochen LIU, Yuanyuan GAO, Nan SHA, Guozhen ZANG, Kui XU
2020 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
The secrecy rate is maximized by jointly designing the beamforming vector at source and beamforming matrix at relay, under the constraints of transmit power at RF power supplier and destination.  ...  In this letter, we investigate the secure transmission in radio frequency (RF) powered two-hop untrusted relay networks, where the source node and untrusted relay are both wireless powered by an RF power  ...  The secure beamforming was designed for cognitive radio networks in [10] , while the energy efficiency was maximized for the SWIPT networks based on non-linear EH model in [12] .  ... 
doi:10.1587/transfun.2019cil0001 fatcat:tkcpnwbh3zafbk6xbseto3g57u

Reconfigurable Intelligent Surface Aided Multi-user Communications: State-of-the-Art Techniques and Open Issues

Munyaradzi Munochiveyi, Arjun Chakravarthi Pogaku, Dinh-Thuan Do, Anh-Tu Le, Miroslav Voznak, Nhan Duc Nguyen
2021 IEEE Access  
(LiFi), and Cognitive Radio (CR) systems.  ...  access (RSMA), cognitive radio (CR), simultaneous wireless information and power transfer (SWIPT), light fidelity (LiFi).  ...  The authors maximized the achievable secrecy rate via joint design of the transmit beamforming with jamming or AN and IRS continuous phase shifts subject to transmit power.  ... 
doi:10.1109/access.2021.3107316 fatcat:xkq2dayoabfhvixcfb25eobkq4

A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems

Yuandong Wu, Yan Huo, Zhuojun Duan
2021 Wireless Communications and Mobile Computing  
Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for  ...  Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints.  ...  For a given channel, finding the secrecy capacity is equivalent to finding the joint distribution of V and X, i.e., pðv, xÞ, u ∈ U, x ∈ X, which maximizes the difference in (2) .  ... 
doi:10.1155/2021/6638405 fatcat:tm3i6b25krcgna33kweipus5ge

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks.  ...  In [133] , the authors considered the joint source/relay beamforming design problem for secrecy rate maximization, through a one-way untrusted MIMO relay.  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks.  ...  In [133] , the authors considered the joint source/relay beamforming design problem for secrecy rate maximization, through a one-way untrusted MIMO relay.  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

Secure Beamforming in 5G-Based Cognitive Radio Network

Hyils Sharon Magdalene Antony, Thulasimani Lakshmanan
2019 Symmetry  
Thus, we predicted that the impact of interferences would be greatly reduced by the proposed technique, and that the proposed technique would maximize the entire secrecy rate in the 5G-based cognitive  ...  Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) is a significant system in the 5G wireless communication system.  ...  The proposed technique is very effective in enlarging the total secrecy rate of the CRN systems. For the future work, the proposed method may be used in IoT-based cognitive radio networks.  ... 
doi:10.3390/sym11101260 fatcat:u4rfka2fpfdetkgjzecnbk62ia
« Previous Showing results 1 — 15 out of 284 results