Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








218 Hits in 4.2 sec

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
, and relay networks.  ...  This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks.  ...  [157] considered utilizing a buffer-aided relay to enhance both transmission efficiency and security for two-hop relay networks.  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
, and relay networks.  ...  This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks.  ...  [157] considered utilizing a buffer-aided relay to enhance both transmission efficiency and security for two-hop relay networks.  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

A Comprehensive Review on Spectrum Management, Security and Energy-Efficient Cognitive Radio Networks

Shyleshchandra Gudihatti, S. H., Venugopal K.
2019 International Journal of Computer Applications  
In addition, we study the energy efficient routing techniques like network optimization frameworks in cooperative networks, protocols and different types of attack issues, approaches for handling the secure  ...  Cognitive Radio Network (CRN) is an evident optimal solution in alleviating the challenges of spectrum unused potentially in wireless networks.  ...  ., [89] developed two multi-hop ad-hoc networks, That uses IEEE 802.11 based MAC protocol.  ... 
doi:10.5120/ijca2019918371 fatcat:d5yvihq4zfhvxbz4lml7bruxm4

Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network

Mohamed Ali, Ibrahim A. Abd El-Moghith, Mohamed N. El-Derini, Saad M. Darwish
2022 Computers Materials & Continua  
MDPs are then utilized to determine the suitable next-hop as a forwarding node capable of securely transmitting messages.  ...  As a consequence of these concerns, this paper proposes a trusted routing technique that combines blockchain infrastructure, deep neural networks, and Markov Decision Processes (MDPs) to improve the security  ...  There are two types of data transmission in a wireless sensor network: direct transmission and multi-hop data transfer. Multi-hop data transfer is utilized in this instance.  ... 
doi:10.32604/cmc.2022.021305 fatcat:flel2m4w7zeyvfzb53purmyrde

A Secure Wireless Information and Energy Cooperation Transmission Strategy in Spectrum Sharing Networks with Untrusted Dual-Relay

Daqian Zhao, Hui Tian, Ping Zhang
2019 IEEE Access  
networks with untrusted cooperative dual-relay.  ...  In this paper, we investigate a problem of security cooperation transmission between a single-antenna primary system and a multi-antenna wireless-powered untrusted secondary system, where the untrusted  ...  In [38] , the authors study a secure transmission scheme for dual-hop multi-antenna underlay spectrum sharing relaying systems.  ... 
doi:10.1109/access.2019.2932762 fatcat:of5uxf5hynegjjl5lflute3mpq

Securing Relay Networks with Artificial Noise: An Error Performance-Based Approach

Ying Liu, Liang Li, George Alexandropoulos, Marius Pesavento
2017 Entropy  
We apply the concept of artificial and controlled interference in a two-hop relay network with an untrusted relay, aiming at enhancing the wireless communication secrecy between the source and the destination  ...  For instance, in a secure sensor network at an airport, terminals with low secrecy levels must have restricted data access, whereas a few terminals at a much higher secrecy level are allowed to access  ...  Author Contributions: Ying Liu and Liang Li developed the work in discussion with Marius Pesavento and George Alexandropoulos.  ... 
doi:10.3390/e19080384 fatcat:ghs57mszzjafvmwgbclnltv7di

Apply Artificial Noise To Secure Fading Relay Networks: A SER-Based Approach [article]

Ying Liu, Liang Li, George C. Alexandropoulos, Marius Pesavento
2016 arXiv   pre-print
We apply the concept of artificial and controlled interference in a triangular relay network with an untrusted relay aiming at enhancing the wireless communication secrecy between the source and the destination  ...  The objective of our considered AN design is to degrade the error probability performance at the untrusted relay, for different types of channel state information (CSI) at the destination.  ...  wiretap channels [7] [8] [9] [10] [11] [12] , multi-user networks [13, 14] , and relay networks [15] [16] [17] [18] [19] .  ... 
arXiv:1506.07491v3 fatcat:uoup4cscozfuri4cvddxt3dajy

Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT with Multiple Access Mobile Edge Computing in Smart City

Dong Wang, Bo Bai, Kai Lei, Wenbo Zhao, Yanping Yang, Zhu Han
2019 IEEE Access  
Specifically, we investigate the secure wiretap coding, resource allocation, signal processing, and multi-node cooperation, along with physical layer key generation and authentication, to cope with the  ...  However, deploying cloud computing capability within the radio access network may face serious security threats, which stem from not only the existing technologies and networks but also the MA-MEC-based  ...  It is worth noting that, the cooperative relaying can also be implemented with untrusted nodes for achieving a higher secrecy rate while protecting the confidential data from them [58] .  ... 
doi:10.1109/access.2019.2913438 fatcat:bk2b4tiy4jf5pmrmtpu72w5x7a

Safeguarding Next Generation Multiple Access Using Physical Layer Security Techniques: A Tutorial [article]

Lu Lv, Dongyang Xu, Rose Qingyang Hu, Yinghui Ye, Long Yang, Xianfu Lei, Xianbin Wang, Dong In Kim, Arumugam Nallanathan
2024 arXiv   pre-print
The purpose of this tutorial is to provide a comprehensive overview on the state-of-the-art physical layer security techniques that guarantee wireless security and privacy for NOMA networks, along with  ...  This inspires the embrace of non-orthogonal multiple access (NOMA) in future wireless communication networks.  ...  This performance enhancement can be demonstrated by conceiving a multi-user and multi-relay cooperative network, where the best relay and the best user pair are selected to assist the two-hop secure transmission  ... 
arXiv:2403.16477v1 fatcat:jc3hu4bxgbfudibqp2nn334jdi

Relaying in the Internet of Things (IoT): A Survey

Uyoata Uyoata, Joyce Mwangama, Ramoni Adeogun
2021 IEEE Access  
The works in [92] , [82] and [93] studied networks with untrusted relays.  ...  2) the case of an untrusted relay whose forwarding services are required in IoT networks, as shown in Fig 7. 1) Secure Relay-enabled IoT Networks with Trusted Relays The use of artificial noise is  ... 
doi:10.1109/access.2021.3112940 fatcat:beo5j6hyd5hwhlxj4mp5vok4sq

Towards Designing a Trusted Routing Scheme in Wireless Sensor Networks: A New Deep Blockchain Approach

Saad M. Darwish
2021 IEEE Access  
There are two types of data transmission in a wireless sensor network: direct transmission and multi-hop data transfer. Multi-hop data transfer is utilized in this instance.  ...  [27] developed a blockchain-based contractual routing system for networks with untrusted nodes using smart contracts.  ... 
doi:10.1109/access.2021.3098933 fatcat:4b3hanssxbctneiz5nuny65j3y

2020 Index IEEE Transactions on Wireless Communications Vol. 19

2020 IEEE Transactions on Wireless Communications  
., Joint Access and Backhaul Resource Management in Satellite-Drone Networks: A Competitive Market Approach; TWC June 2020 3908-3923 Hu, Y.H., see Xia, M., TWC June 2020 3769-3781 Hua, C., see Li, M  ...  Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay.  ...  ., +, TWC Oct. 2020 6826-6843 Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay.  ... 
doi:10.1109/twc.2020.3044507 fatcat:ie4rwz4dgvaqbaxf3idysubc54

2020 Index IEEE Transactions on Vehicular Technology Vol. 69

2020 IEEE Transactions on Vehicular Technology  
Relaying System With SWIPT Under Outdated CSI; TVT Dec. 2020 15580-15593 Hodtani, G.A., see Gholami, R., TVT Sept. 2020 9938-9950 Hoki, K., see Kawakami, T., TVT Dec. 2020 16168-16172 Hong, C.,  ...  + Check author entry for coauthors ami-mFading Channels With Integer and Non-Integerm; TVT March 2020 2785-2801 Hoang, T.M., Tran, X.N., Nguyen, B.C., and Dung, L.T., On the Performance of MIMO Full-Duplex  ...  Multi-Level Sequence-Based Frequency-Hopping in Multi-Cell Networks.  ... 
doi:10.1109/tvt.2021.3055470 fatcat:536l4pgnufhixneoa3a3dibdma

Quantum Key Distribution Secured Optical Networks: A Survey

Purva Sharma, Anuj Agrawal, Vimal Bhatia, Shashi Prakash, Amit Kumar Mishra
2021 IEEE Open Journal of the Communications Society  
Finally, major findings from this comprehensive survey are summarized with highlighting open issues and challenges in QKD secured optical networks.  ...  Different architectures of QKD secured optical networks are described next.  ...  QKD secured Optical Network Architecture with hybrid trusted/untrusted relay based QKD A new QKD secured optical network architecture with hybrid trusted/untrusted relay based QKD has been introduced in  ... 
doi:10.1109/ojcoms.2021.3106659 fatcat:tshdrc2ayjf4bgtziz7cg6eio4

A Survey on Millimeter-Wave Beamforming Enabled UAV Communications and Networking [article]

Zhenyu Xiao, Lipeng Zhu, Yanming Liu, Pengfei Yi, Rui Zhang, Xiang-Gen Xia, Robert Schober
2021 arXiv   pre-print
On the other hand, UAVs serving as aerial access points or relays can significantly enhance the coverage and quality of service of the terrestrial mmWave cellular networks.  ...  Subsequently, the technologies and solutions for UAV-connected mmWave cellular networks and mmWave-UAV ad hoc networks are reviewed, respectively.  ...  Thus, in ad hoc networks, it is important to reasonably design the frame to guarantee efficient transmission and avoid collisions as multi-path and multi-hop routing generates [308] .  ... 
arXiv:2104.09204v2 fatcat:rbywt5p7uzhhzg3hbc7tnln45q
« Previous Showing results 1 — 15 out of 218 results