Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, relay selection is considered to enhance security of a cooperative system with multiple threshold-selection decode-and-forward (DF) relays. Threshold-selection DF relays are the relays in which a predefined signal-to-noise ratio is set for the condition of successful decoding of the source message. We focus on the practical and general scenario where the channels suffer from independent...
This paper proposes a new paradigm of shared spectrum access between cellular wireless communications (CWC) and radio astronomy systems (RAS). Traditionally, most spectrum chunks are separately allocated to CWC and RAS, with a few shared spectrum without guaranteed spectrum access for RAS. Furthermore, RAS sites are generally set up at remote locations, protected by radio quiet zones. In view of growths...
In this paper, we consider the secure connection problem in multihop wireless networks with full-duplex (FD) jamming relaying, where the colluding eavesdroppers are randomly distributed following a homogeneous Poisson point process (PPP). By applying FD, each legitimate node (including relay and destination) jams the eavesdroppers when it receives the desired signal from transmitter. We adopt the...
In this paper, weighted fractional Fourier transform (WFRFT) is employed to safeguard the physical layer (PHY) security of wireless communications. By leveraging the features of WFRFT, we propose a PHY security modulation scheme, which significantly degrades the equivalent signal-to-noise ratio (SNR) of the unauthorized receiver while imposing no impact on the legitimate receiver. With the proposed...
In this paper, we propose a secure transmission protocol for two users exchanging their respective information in an n-hop MIMO Ad hoc network. By exploiting the properties of the transmission medium in the physical layer, three channel models are utilized to provide secure transmission, namely one-way relay channel, two-way untrusted relay channel, and multiple access channel. Using these channel...
In this paper, we investigate the physical layer security for heterogeneous networks (HetNets), where the confidential message transmitted to each legitimate user can be eavesdropped by multiple eavesdroppers. To enhance the secrecy performance, we introduce friendly jammers and full duplex users in our model. We propose a jammer selection scheme based on average user received jamming power. The jammers...
In this paper, we consider the multi-channel power optimization to enhance security for a full-duplex (FD) transmission pair. The FD-enabled concurrent transmissions between the users, on one hand, induce self-interference at their own receivers, and on the other hand, act as friendly jamming to degrade the eavesdropping for the other. To elaborate on such a tradeoff for secrecy maximization, we investigate...
Security has become an increasingly important issue in wireless communications for the IoT (Internet of Things) environments, to which physical layer approaches can contribute by differentiating desired transceiver and wiretap channels for security of confidential data. In this paper, we propose an optimal power allocation strategy for practical physical-layer security, based on friendly jamming with...
In this paper, we investigate the physical-layer security of slow fading wiretap channel with channel estimation errors. We aim to maximize the reliable secrecy rate under constraints of secrecy outage probability and reliability outage probability. To this end, we propose an adaptive (ADP) transmission scheme in which the communication rate and secrecy rate are adaptively adjusted based on the estimated...
In the simultaneous wireless information and power transfer (SWIPT) system, due to the broadcast nature of wireless radio, the energy receiver may act as a potential eavesdropper to eavesdrop the information sent to the information receiver. To address this issue, in this paper, we propose an optimization framework of target secrecy rate and power allocation ratio based on secrecy outage probability...
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential messages, since they may reside in the signal beam. This paper explores the potential of physical layer security in the mmWave ad hoc networks. Specifically,...
Exploiting cognition to the cache-enabled device-to- device (D2D) communication underlaying the multi- channel cellular network is the main focus of this paper. D2D pairs perform direct communications via sensing the available cellular channels, bypassing the base station (BS). Dynamic service is considered and the network performance is evaluated with the stochastic geometry. Node locations are first...
We examine for the first time the impact of transmitter-side correlation on the secure transmission with artificial noise (AN), based on which a new power allocation strategy for AN is devised for physical layer security enhancement. Specifically, we design a correlation-based power allocation (CPA) for AN, of which the optimality in terms of achieving the minimum secrecy outage probability is analytically...
For content-centric wireless networks, pushing and proactive caching hold the promise of greatly improving system throughput in the future. However, the throughput gains obtained from these techniques are limited by the energy of the base station and the buffer size of the receivers. To make full use of this energy and these buffers, this paper presents a Joint Pushing and Caching (JPC) method for...
When extracting physical layer security secret key with multiple wireless channel samples, its capacity is affected by the time difference of channel sounding, terminal's moving speed, sampling period, the number of samples, and additive noise. In order to quantitatively analyze their effects and determine the constrains on the optimal sampling period, a closed-form solution to the physical layer...
This paper proposes a full-duplex physical security model with self-interference remaining. This model doesn't need the assistance of external jamming nodes and it ensures that the uplink and downlink transmission of the full-duplex system can achieve the required secrecy rate. Meanwhile, it creates a base station transmission power optimization problem with flexible constraints and a two-level method...
In this paper, we introduce a new scheme called Mutual Preamble Detection (MPD) to reduce the collision recovery time in broadband power line communication (BB-PLC) networks. Although latest BB- PLC products deliver a physical layer data rate of over 1000 Mbps, this is not efficiently translated into the medium access control (MAC) layer throughput due to several factors, including the long time intervals...
We study learning-based energy-efficient multi- user scheduling of delay-sensitive data over fading channels. To tradeoff energy and delay, we combine adaptive rate transmission at the physical layer with a rate-adaptive medium access control (MAC) protocol based on carrier sense multiple access with collision avoidance (CSMA/CA). We formulate the multi-user scheduling problem as a constrained Markov...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.