In this work, by considering a variety of realistic hardware impairments, we aim to enhance the security of a cooperative relaying network, where a source intends to transmit its …
Y Zou, J Zhu, X Jiang - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
In this article, we consider an energy-harvesting (EH) relay system consisting of a source, a destination, and multiple EH decode-and-forward (DF) relays that can harvest the energy …
X Li, HN Dai, MK Shukla, D Li, H Xu, M Imran - Computer Standards & …, 2021 - Elsevier
The security vulnerabilities are becoming the major obstacle to prevent the wide adoption of ultra-reliable and low latency communications (URLLC) in 5G and beyond communications …
L Qing, H Guangyao, F Xiaomei - IEEE Communications …, 2018 - ieeexplore.ieee.org
In this letter, we consider secure communication of one source-destination pair with multi- hop amplify-and-forward relays. We utilize compressed sensing (CS) to guarantee the CS …
As many security solutions integrated with various technologies have been proposed against eavesdropping attacks, technical advances for adversaries can also pose a serious …
Q Guo, W Feng - IEEE Access, 2019 - ieeexplore.ieee.org
Physical layer security (PLS) in the presence of multiple eavesdroppers over Nakagami- fading channels for cooperative decode-and-forward (DF) relay network that consists of one …
M Atallah, G Kaddoum - IEEE Transactions on Vehicular …, 2019 - ieeexplore.ieee.org
This paper proposes a new location-based multicasting technique, for dual phase amplify- and-forward (AF) large networks, aiming to improve the security in the presence of non …
In this letter, we consider multiple peer to peer communications using a trusted relay network encountered to the jamming network attack. The jammers, that are equipped with …