Energy management for secure transmission in wireless powered communication networks

S Zhang, S Kong, K Chi, L Huang - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
… 1) We consider the secure data transmission for a wireless powered IoT network with …
transmission technology to deal with the energy shortage and adopt PLS to guarantee the security

Secure data transmission in mobile ad hoc networks

P Papadimitratos, ZJ Haas - … the 2nd ACM workshop on Wireless security, 2003 - dl.acm.org
… and deny communication of other nodes. In this paper, we present and evaluate the Secure
Message Transmission (SMT) protocol, which safeguards the data transmission against …

On perfectly secure communication over arbitrary networks

MVNA Kumar, PR Goundan, K Srinathan… - Proceedings of the …, 2002 - dl.acm.org
… If secure transmission of the pad is successful, then S SENDS Z ---- m ® p PUBLICLY. R
receives Z PUBLICLY and thus obtains m = ZO p. Any iteration of the protocol dealing with …

Secure UAV communication networks over 5G

B Li, Z Fei, Y Zhang, M Guizani - … Wireless Communications, 2019 - ieeexplore.ieee.org
… , and realizes keyless secure transmission via signal design and … -layer security to UAV
communication networks for surmount… a UAV network aims to achieve secrecy communications in …

Accumulate then transmit: Toward secure wireless powered communication networks

Y Bi, A Jamalipour - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
… In this paper, we investigated the secure transmission in a WPCN, where a RF energy
harvesting source communicates with a destination assisted by a multi-antenna PB in the …

Secure transmission for downlink NOMA visible light communication networks

C Du, F Zhang, S Ma, Y Tang, H Li, H Wang, S Li - IEEE Access, 2019 - ieeexplore.ieee.org
… [19], which means that NOMA is well applicable for VLC networks. One of major security
physical-layer security ensures a secure transmission based on the differences between the …

Secure data communication in mobile ad hoc networks

P Papadimitratos, ZJ Haas - … Areas in Communications, 2006 - ieeexplore.ieee.org
communication in the presence of adversaries across a multihop wireless network with …
malicious disruption of data transmissions, we propose and evaluate the secure message …

Secure wireless powered cooperative communication networks with finite energy storage

Y Wang, H Yin, W Yang, T Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
secure transmission in a wireless powered cooperative communication network (WPCCN) …
storage are deployed to assist the secure transmission between source and destination in the …

Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers

X Xu, B He, W Yang, X Zhou… - … Forensics and Security, 2015 - ieeexplore.ieee.org
… We consider the problem of secure communication between a secondary transmitter– … , we
design four transmission protocols to achieve the secure transmission in the CR network. We …

Quantum state secure transmission in network communications

XB Chen, Y Su, G Xu, Y Sun, YX Yang - Information Sciences, 2014 - Elsevier
… state secure transmission in quantum network communications… a general model in the network
secure communications. Thus, … , secure broadcasting and secure multi-party computation. …