Joint Impact of Nodes Mobility and Imperfect Channel Estimates on the Secrecy Performance of Cognitive Radio Vehicular Networks Over Nakagami-m Fading …

A Pandey, S Yadav - IEEE Open Journal of Vehicular …, 2021 - ieeexplore.ieee.org
This paper investigates the joint impact of nodes' mobility and imperfect channel estimates
on the secrecy performance of an underlay cognitive radio vehicular network over Nakagami …

Security and reliability analysis of a two-way half-duplex wireless relaying network using partial relay selection and hybrid TPSR energy harvesting at relay nodes

DH Ha, TN Nguyen, MHQ Tran, X Li, PT Tran… - IEEE …, 2020 - ieeexplore.ieee.org
In recent years, physical layer security has been considered as an effective method to
enhance the information security beside the cryptographic techniques that are used in upper …

Improved African buffalo optimization-based energy efficient clustering wireless sensor networks using metaheuristic routing technique

SK Barnwal, A Prakash, DK Yadav - Wireless Personal Communications, 2023 - Springer
Wireless sensor network (WSN) plays a crucial role in the Internet of Things (IoTs), which
assist to produce seamless information that have a great impact on the network lifetime …

Physical layer security in two-way Swipt relay networks with imperfect CSI and a Friendly Jammer

M Hayajneh, TA Gulliver - Entropy, 2023 - mdpi.com
In this paper, the security of two-way relay communications in the presence of a passive
eavesdropper is investigated. Two users communicate via a relay that depends solely on …

Secrecy performance of cognitive vehicular radio networks: Joint impact of nodes mobility and imperfect channel estimates

S Yadav, A Pandey - 2020 IEEE International Black Sea …, 2020 - ieeexplore.ieee.org
In this paper, we investigate the joint impact of nodes mobility and imperfect channel
estimates on the secrecy performance of a cognitive vehicular radio network under time …

Secure mm‐Wave communications with imperfect hardware and uncertain eavesdropper location

S Mashdour, M Moradikia… - Transactions on Emerging …, 2020 - Wiley Online Library
This article examines the secrecy performance of millimeter‐wave (mm‐Wave)
communications with imperfect hardware and uncertain eavesdropper (Eve) location. We …

Scheduling and adaptive listening approaches in MAC for WSN applications: A survey

S Radha, GJ Bala, E Kanaga… - Journal of High …, 2020 - content.iospress.com
False data detection, intrusion detection and coverage rate are major challenges in wireless
sensor networks (WSN). Scheduling in media access control (MAC) using gateway and …

Secrecy performance of two‐way integrated satellite terrestrial relay networks with multiple users

D Yang, B Ren, H Li, X Wang, K Guo - Electronics Letters, 2022 - Wiley Online Library
This letter studies the secrecy performance for a two‐way integrated satellite terrestrial relay
networks. Particularly, multiple legitimate users along with maximal user scheduling scheme …

On the outage performance of two-way relay-assisted multiuser vehicular networks over double Nakagami-m fading channels

R Gour, S Yadav, N Purohit… - 2022 IEEE 6th …, 2022 - ieeexplore.ieee.org
Ahstract-This paper investigates the outage performance of two-way relay-assisted vehicular
communication systems. In particular, a multiuser vehicular system is considered wherein a …

Secure cooperative fixed gain untrusted relay networks with destination assisted jamming under Nakagami-m fading channels

A Pandey, S Yadav - 2020 IEEE International Black Sea …, 2020 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a dual-hop cooperative untrusted
relay network. In this network, a source node communicates with the destination node via an …