… Security is a requirement that is present on every technological interaction. In order to improve secrecy at physical layer of a communication within the presence of an eavesdropper, this …
HM Wang, Q Yin, XG Xia - IEEE Transactions on Signal …, 2012 - ieeexplore.ieee.org
… layersecurity of bidirectional (two-way) information transmission of two terminals with the help of multiple relay nodes in the presence of an … To avoid interfering the legitimate users, we …
… to a common receiver in the presence of a passive eavesdropper. In order … interference requirements for a given interference price and the best interference price for a given interference …
Z Wei, C Masouros - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
… -layersecurity-aware system, we aim at minimizing power consumption by jointly designing DA selection and secure … message to the IR in the presence of K possible Eves. We focus on …
Y Zou, X Wang, W Shen - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
… users (CUs) in the presence of multiple eavesdroppers, where CUs … -layersecurity in cognitive radio networks, we need to consider how to avoid causing additional harmful interference …
A El Shafie, A Sultan, N Al-Dhahir - IEEE Communications …, 2016 - ieeexplore.ieee.org
… self-interference power. Thus, the received SINR at Rooney is degraded due to self-interference … Al-Dhahir, “Secure communications in the presence of a buffer-aided wireless-powered …
L Hu, H Wen, B Wu, F Pan, RF Liao… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
… presence of multiple passive and noncolluding eavesdroppers (Eves). In addition, a cooperative jammer (Charlie) emits interference … In other words, it nulls out the interference toward …
… interference of the system; more energy is needed to provide … sends confidential message in the presence of an eavesdropper. … power enhancement and interference suppression at the …
… for improving physical layer based security for wireless networks in the presence of an … , a relay node transmits a jamming signal to create interference at the eavesdropper. In this paper, …