A light weight secure communication scheme for wireless sensor networks

R Geetha, V Madhusudhan, T Padmavathy… - … Communications, 2019 - Springer
… (CL-EKM) protocol for secure communication which is characterized by node mobility. The
… The selection of common seeds in the range leads to the reduced storage space (seed size …

A secured and intelligent communication scheme for IIoT-enabled pervasive edge computing

F Khan, MA Jan, A ur Rehman… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
… challenges in terms of secured communication, network connectivity, … a secured and intelligent
communication scheme for PEC in an IIoT-enabled infrastructure. In the proposed scheme

A secure communication scheme based on equivalent interference channel assisted by physical layer secret keys

X Hu, L Jin, K Huang, K Ma, C Song… - … and Communication …, 2020 - Wiley Online Library
… secret key generation schemes need information reconciliation … proposes a novel secure
communication scheme based on a … a method for dynamically selecting q according to SNR. …

A novel coding scheme for secure communications in distributed RFID systems

K Sakai, MT Sun, WS Ku, TH Lai - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
… We denote Is and It as the indexes of the selected bits by the TSD and the tag, respectively.
… In this subsection, we consider the security of our coding scheme against an eavesdropper …

Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer

DWK Ng, ES Lo, R Schober - IEEE transactions on vehicular …, 2015 - ieeexplore.ieee.org
… a beamforming scheme for the maximization of the energy efficiency of secure communication
… vectors r, the performance of scheme 2 can be improved by selecting the best wsub = UΣ1/…

Opportunistic relay selection for cooperative networks with secrecy constraints

I Krikidis - IET communications, 2010 - IET
selection techniques. However, it is worth noting that the asymptotic performance of the
conventional approach for secure communications … As far as the suboptimal selection scheme is …

[HTML][HTML] A new hyperchaotic map for a secure communication scheme with an experimental realization

NMG Al-Saidi, D Younus, H Natiq, MRK Ariffin… - Symmetry, 2020 - mdpi.com
… Using different chaotic systems in secure communication, nonlinear control, and many
other … applications, we propose a symmetric secure communication system using the 2D-ICSM. …

A physical layer security-based transmit antenna selection scheme for NOMA systems

K Shim, H Oh, TN Do, B An - 2018 Tenth International …, 2018 - ieeexplore.ieee.org
… the PHY-security-based TAS scheme, which selected the most robust … scheme supports
higher security capability for the NOMA system in comparison to some existing TAS schemes

Security-aware relaying scheme for cooperative networks with untrusted relay nodes

L Sun, P Ren, Q Du, Y Wang… - IEEE Communications …, 2014 - ieeexplore.ieee.org
… McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. …
, “Relay selection schemes for dual-hop networks under security constraints with multiple …

[HTML][HTML] On the design of an AI-driven secure communication scheme for internet of medical things environment

N Garg, R Petwal, M Wazid, DP Singh, AK Das… - Digital Communications …, 2023 - Elsevier
… the security analysis of the proposed scheme to show its security … of the proposed scheme
with other similar schemes is presented… scheme outperforms other similar schemes in terms of …