[HTML][HTML] Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware …

P Tran Tin, TN Nguyen, NQ Sang, T Trung Duy… - Entropy, 2019 - mdpi.com
In this paper, we propose a rateless codes-based communication protocol to provide
security for wireless systems. In the proposed protocol, a source uses the transmit antenna …

Secrecy performance evaluation of tas protocol exploiting fountain codes and cooperative jamming under impact of hardware impairments

DT Hung, TT Duy, VNQ Bao - 2018 2nd International …, 2018 - ieeexplore.ieee.org
In this paper, we propose a transmit antenna selection (TAS) protocol exploiting Fountain
codes for secure communication. In the proposed protocol, a base station (BS) selects its …

Security-Reliability Tradeoff of Multi-hop Secure Communication Networks Using Fountain Codes and RIS-aided Cooperative Communication

VT Ty, TT Duy, LT Tu, TT Nguyen… - 2023 International …, 2023 - ieeexplore.ieee.org
This papers investigates security-reliability trade-off for multi-hop secure communication
networks using Fountain codes (FCs) and reconfigurable intelligent surface (RIS). In the …

Artificial-noise-aided secure transmission scheme with limited training and feedback overhead

J Hu, Y Cai, N Yang, X Zhou… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We design a novel artificial-noise-aided secure ON-OFF transmission scheme in a wiretap
channel. We consider a practical scenario, where the multi-antenna transmitter only obtains …

Secure transmission in MISOME wiretap channel with multiple assisting jammers: Maximum secrecy rate and optimal power allocation

H Wu, X Tao, Z Han, N Li, J Xu - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
This paper investigates the secrecy rate maximization problem for the multiple-input-single-
output multiple-antenna-eavesdropper (MISOME) wiretap channel with multiple randomly …

Secure communications via sending artificial noise by both transmitter and receiver: optimum power allocation to minimise the insecure region

W Li, Y Tang, M Ghogho, J Wei, C Xiong - IET Communications, 2014 - Wiley Online Library
A novel approach for ensuring confidential wireless communication is proposed and
analysed from a geometrical perspective. In this method, both the legitimate receiver and …

[HTML][HTML] Multi-Antenna Jammer-Assisted Secure Short Packet Communications in IoT Networks

D Chen, J Li, J Hu, X Zhang, S Zhang - Future Internet, 2023 - mdpi.com
In this work, we exploit a multi-antenna cooperative jammer to enable secure short packet
communications in Internet of Things (IoT) networks. Specifically, we propose three jamming …

Achieving strong security based on fountain code with coset pre‐coding

M Yi, X Ji, K Huang, H Wen, B Wu - IET Communications, 2014 - Wiley Online Library
This study proposes an approach for achieving strong communication security based on
explosive fountain code with coset pre‐coding, where both main and wire‐tap channels are …

Code‐Hopping Based Transmission Scheme for Wireless Physical‐Layer Security

L Yin, W Hao - Wireless Communications and Mobile …, 2018 - Wiley Online Library
Due to the broadcast and time‐varying natures of wireless channels, traditional
communication systems that provide data encryption at the application layer suffer many …

Security of an ordered-based distributive jamming scheme

A El Shafie, D Niyato… - IEEE Communications …, 2016 - ieeexplore.ieee.org
This letter proposes a new efficient yet simple distributed ordered-based jamming scheme
for securing a legitimate transmission and powering a wireless receiver equipped with a …