Energy-efficient secure multiuser scheduling in energy harvesting untrusted relay networks

D Chen, Y Cheng, X Wang, W Yang… - Journal of …, 2019 - ieeexplore.ieee.org
… to analyze the secrecy performance comprehensively of the multiuser energy harvesting
untrusted … In this paper, we studied the secrecy performance of a multiuser energy harvesting

Security of rechargeable energy-harvesting transmitters in wireless networks

A El Shafie, D Niyato… - IEEE Wireless …, 2016 - ieeexplore.ieee.org
… We investigate the impact of the energy arrival rates at the batteries on the system’s secrecy
… the secrecy rate. • We show that when one of the two batteries is saturated with energy, the …

A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning

P Xie, F Li, I You, L Xing, H Wu, H Ma - Sensors, 2022 - mdpi.com
… a secrecy transmission protocol based on energy harvesting and jammer selection for FL,
in which the secondary transmitters can harvest energy … jammer to provide secrecy service. …

Secure energy efficiency for NOMA based cognitive radio networks with nonlinear energy harvesting

D Wang, S Men - IEEE Access, 2018 - ieeexplore.ieee.org
… that the secrecy energy efficiency of the linear energy harvesting model is … secrecy energy
efficiency of the linear energy harvesting model is higher than the nonlinear energy harvesting

Secure communications in three-step two-way energy harvesting DF relaying

F Jameel, S Wyne, Z Ding - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
… work analyzed the secrecy performance of a TT-DF relay with energy harvesting capability.
… for ID at the relay to improve the secrecy performance, especially for small relay reception …

Cooperative jamming for energy harvesting multicast networks with an untrusted relay

B He, J Chen, Y Kuo, L Yang - IET Communications, 2017 - Wiley Online Library
… , energy harvesting (EH) … secrecy rate with a total transmission power constraint and an EH
constraint. In [23] the optimal secrecy policy has been proposed to maximise the secrecy rate …

Overlay networks with jamming and energy harvesting: security analysis

K Ho-Van, T Do-Dac - Arabian Journal for Science and Engineering, 2021 - Springer
energy efficiency, the secondary transmitter and all jammers only use energy harvested
-form expressions of primary/secondary secrecy outage probabilities are first proposed. Then, …

Primary secrecy is achievable: Optimal secrecy rate in overlay crns with an energy harvesting secondary transmitter

L Chen, L Huang, H Xu, C Yang… - … and Networks (ICCCN …, 2015 - ieeexplore.ieee.org
… Abstract—To tackle the challenging secrecy communication problem in energy harvesting
cognitive radio networks, this paper considers an overlay system with one energy harvesting

Cooperative privacy provisioning for energy harvesting based cognitive multi-relay networks

D Wang, W Liang, X Hu, D Zhai… - China …, 2020 - ieeexplore.ieee.org
… , we propose an energy harvesting based se… analyze the secrecy performances including
the secrecy outage probability, the probability of positive secrecy rate, and the ergodic secrecy

Secrecy Performance of Energy-Harvesting Backscatter Communication Network Under Different Tag Selection Schemes

Y Khan, A Afzal, A Dubey… - IEEE Journal of Radio …, 2024 - ieeexplore.ieee.org
… Abstract—This paper investigates the secrecy performance of an Backscatter communication
(BackCom) network considering a practical non-linear energy harvesting model with …