The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delay and security are both highly concerned in the Internet of Things (IoT). In this paper, we set up a secure analytical framework for IoT networks to characterize the network delay performance and secrecy performance. Firstly, stochastic geometry and queueing theory are adopted to model the location of IoT devices and the temporal arrival of packets. Based on this model, a low-complexity secure...
In this paper, secure communication for RF-powered cognitive networks has been investigated in which the secondary source (SS) transmits confidential information to the destination (SD) using the harvested energy form primary transmitter (PT) in the presence of a passive eavesdropper (SE). Note that the transmission power at the SS is subject to two important constraint: 1) the maximum transmission...
Energy-efficiency, high data rates and secure communications are essential requirements of the future wireless networks. In this paper, we develop a framework to study the energy efficiency for enhancing physical layer security (PLS) in large-scale random cognitive radio networks (CRNs) considering the node spatial distribution, wireless propagation medium and aggregate network interference. Using...
This work investigates the secure transmission in the wireless information and power transfer system where a source node communicates with a wireless-powered full-duplex destination node in the presence of a passive eavesdropper. In particular, we propose such a two-phase time-sharing (TS) secure communication protocol: in the first phase, energy harvesting is conducted from the source node to the...
In this paper, we investigate the secrecy outage probability (SOP) for the cooperative decode-and-forward (DF) underlay cognitive radio networks (CRNs). Duo to the spectrum sharing approach in underlay CRNs, the secondary transmitters (secondary source (SUS) and secondary relay (SUR)) are subjected to interference power constraint at primary user (PU), and the SU receivers (SUR and secondary destination...
Energy conservation and interference reduction are the two ultimate goals of topology control in wireless multihop networks. However, the existing energy-conserving algorithms rarely consider interference reduction or at most consider it implicitly. It has been proved that the power-efficient topology does not guarantee low interference. Considering that in any topology, the nodes affected by the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.