Secure transmission in HARQ-assisted non-orthogonal multiple access networks

Z Xiang, W Yang, G Pan, Y Cai… - … Forensics and Security, 2019 - ieeexplore.ieee.org
… for secure transmissions, in this paper, both NOMA and HARQ are utilized to enhance the
security of … probability (SOP), reliable and secure transmission probability (RSP) and effective …

Secure transmission in non-orthogonal multiple access networks with an untrusted relay

Z Xiang, W Yang, G Pan, Y Cai… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
… the secure transmission in twouser NOMA networks with an … multiple users are served in
NOMA networks, and the internal … to secure the transmission of untrusted relay NOMA networks. …

Secure data transmission in mobile ad hoc networks

P Papadimitratos, ZJ Haas - … the 2nd ACM workshop on Wireless security, 2003 - dl.acm.org
… In this paper, we present and evaluate the Secure Message Transmission (SMT) … To secure
the data transmission phase, we propose and evaluate the Secure Message Transmission (…

Secure data transmission with cloud computing in heterogeneous wireless networks

CH Chu, YC Ouyang, CB Jang - … and Communication Networks, 2012 - Wiley Online Library
… of packet data network interconnection with a public land mobile network supporting GPRS
(… GGSN functionality is common for all types of radio access networks. The SGSN is the node …

Secure transmission design in HARQ assisted cognitive NOMA networks

Z Xiang, W Yang, Y Cai, Z Ding… - … Forensics and Security, 2020 - ieeexplore.ieee.org
… It is worth noting that we provide a lightweight secure transmission scheme compared with
[24] and [25]. Lightweight PLS mechanisms are urgently required for IoT networks and our …

A quantum access network

B Fröhlich, JF Dynes, M Lucamarini, AW Sharpe… - Nature, 2013 - nature.com
… on the same fibre in quantum-secured access networks 29 . Quantum access networks could
initially find application in protecting smart community or smart grid networks, for example, …

Secure transmission in cognitive satellite terrestrial networks

K An, M Lin, J Ouyang, WP Zhu - IEEE Journal on Selected …, 2016 - ieeexplore.ieee.org
… We focus on secure transmission in a CSTN, where the … network. Particularly, our main
contributions can be summarized as follows: • We define a framework for physical layer security in …

Secure transmission for multiuser relay networks

SI Kim, IM Kim, J Heo - IEEE Transactions on Wireless …, 2015 - ieeexplore.ieee.org
… conventional multiuser diversity achieves with no security requirement. To address this issue
and to effectively exploit the multiuser diversity for secure relay networks, in this paper, we …

Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers

X Xu, B He, W Yang, X Zhou… - … Forensics and Security, 2015 - ieeexplore.ieee.org
… design four transmission protocols to achieve the secure transmission in the CR network. We
… analysis for each protocol in terms of transmission delay, security, reliability, and the overall …

Secure transmission in a NOMA-assisted IoT network with diversified communication requirements

Z Xiang, W Yang, Y Cai, J Xiong… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
access (NOMA) scheme which pairs two types of typical users, ie, delay-sensitive user (DSU)
and security-… We focus on the investigation of the secure transmission for the SRU while …