An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based Wireless Sensor Networks

AR Ganesh, PN Manikandan, SP Sethu… - … on Recent Trends in …, 2011 - ieeexplore.ieee.org
… ) of WSNs when no transmission scheme is used and use it to … scheme is employed, there
is a possible scenario where the same sensor among the 𝑛 active sensors may be selected

An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks

F Mezrag, S Bitam, A Mellouk - Journal of Network and Computer …, 2022 - Elsevier
… of security features with the existing relevant schemes is also … of our proposed scheme
(IBAKAS), then the security analysis … in Sections 5 Security analysis of the proposed scheme, 6 …

A Novel Optimization Scheme for the Beamforming Method Selection in Artificial-Noise-aid MU-MISOME Broadcast Secure Communication System

L Yao, Y Liu - … Engineering and Intelligent Communications  …, 2020 - ieeexplore.ieee.org
… In this article, we investigate the selection of beamforming method in MU-MISO … the security
transmitting performance of different beamforming methods by a novel analysis scheme. We …

[HTML][HTML] Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks

L Sun, P Ren, Q Du - EURASIP Journal on Wireless Communications and …, 2014 - Springer
… The proposed selection scheme can be realized in a fully distributed manner, and the security
… Traditional approaches to securing communications rely heavily on the data encryption at …

PTRS: A privacy-preserving trust-based relay selection scheme in VANETs

H Hu, R Lu, C Huang, Z Zhang - Peer-to-Peer Networking and Applications, 2017 - Springer
… It allows us to design a secure and efficient relay selection scheme. Second, we build a
trust-based relay selection scheme through which a requesting vehicle is able to quickly decide …

User selection scheme with secrecy capacity in MIMO downlink systems

M Yanase, T Ohtsuki - Procedia-Social and Behavioral Sciences, 2010 - Elsevier
… However, these user selection schemes do not take security into consideration. One … the
proposed scheme is an effective user selection scheme to guarantee secrecy of communication. …

A fixed-time synchronization-based secure communication scheme for two-layer hybrid coupled networks

L Zhou, F Tan, X Li, L Zhou - Neurocomputing, 2021 - Elsevier
… dynamics, as well as its appliance in secure communications have not been informed yet. …
to study the fixed-time synchronization-based secure communication issue for two-layer hybrid …

Iterative approach with optimization-based execution scheme for parameter identification of distributed parameter systems and its application in secure communication

RG Li, HN Wu - IEEE Transactions on Circuits and Systems I …, 2020 - ieeexplore.ieee.org
… Meanwhile, an execution scheme for the iterative approach is … Simultaneously, secure
communication depending on this … and encryption-decryption scheme. Simulation results verify the …

[HTML][HTML] A lightweight noise-tolerant encryption scheme for secure communication: An unmanned aerial vehicle application

A Shafique, A Mehmood, M Elhadef, KH Khan - PLoS One, 2022 - journals.plos.org
… , are performed to evaluate the security of the proposed … security analysis of the proposed
encryption scheme and the existing work to demonstrate that the suggested encryption scheme

Polarization filtering based physical-layer secure transmission scheme for dual-polarized satellite communication

Z Luo, H Wang, K Zhou - IEEE Access, 2017 - ieeexplore.ieee.org
scheme to enhance the physical layer security (PF-PHY) in dual-polarized satellite
communications… polarization states are selected based on the designed selection rule to carry the …