The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the impacts of mobility on the performance of angle of arrival (AoA) based physical layer secret key (PLSK) is investigated. Specifically, security probability (SP) and consistency probability (CP) are derived to describe the effects of mobility. Moreover, effective key generation rate (EKGR) is defined to evaluate more comprehensively and accurately how the speed in mobile scenario...
In this paper, we aim to improve the physical layer security for Device-to-device (D2D) communication underlaying cellular networks by allocating interference power elegantly, and the security issues of both cellular users and D2D pairs are taken into consideration simultaneously. First of all, the two-level sequential Stackelberg game is introduced to solve the above problem via power allocation,...
In this paper, we investigate an inband cooperative device-to-device (D2D) communication system in cellular networks. Cellular users and D2D pairs help each other to improve their respective performance. Specifically, via coalition formation, cellular users release some of their spectrum to D2D pairs so as to start the communications of the D2D pairs; at the same time, D2D pairs help to relay the...
Physical layer security is an emerging technique to improve the wireless communication security and the corresponding techniques under practical scenarios especially with imperfect channel state information (CSI) need to be taken into consideration. In this paper, we investigate the robust secure transmission for cooperative decode-and-forward (DF) automatic-repeat-request (ARQ) in multiple-input-single-output...
Cooperative relaying and jamming are two efficient schemes to improve the Physical-layer security of a wireless transmission in the presence of multiple eavesdroppers. In this paper, we consider their cooperation in the context of AF-based two-way relay. We propose a hybrid cooperative relaying and jamming mechanism to enhance the security of a two-way relay network, where all the intermediate nodes...
In this paper, the spatial modulation (SM) is considered as a novel physical layer technique to improve the physical layer security of wireless networks. Exploiting the index of antenna as an additional dimension to convey part of source information bits, SM helps to achieve multiplexing gain and realize higher data rates. Moreover, by properly designing the transmission signal, SM can also improve...
In this paper, we propose a hybrid cooperative scheme to improve the secrecy rate for a cooperative network in presence of multiple relays. Each relay node transmits a mixed signal consisting of weighted source signal and intentional noise. The problem of power allocation and joint design of beamforming and jamming weights are investigated, and an iterative solution for the secrecy rate maximization...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.