Networking systems of AI: On the convergence of computing and communications

L Song, X Hu, G Zhang, P Spachos… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Artificial intelligence (AI) and 5G system have been two hot technical areas that are
changing the world. On the deep convergence of computing and communication, networking …

SWIPT-enabled cooperative wireless IoT networks with friendly jammer and eavesdropper: Outage and intercept probability analysis

DT Vo, T Van Chien, TN Nguyen, DH Tran… - IEEE …, 2023 - ieeexplore.ieee.org
Physical layer security (PLS) and simultaneous wireless information and power transfer
(SWIPT) in cooperative relaying have gained great interest as technologies for security and …

Security and reliability analysis of satellite-terrestrial multirelay networks with imperfect CSI

TN Nguyen, DH Tran, T Van Chien… - IEEE Systems …, 2022 - ieeexplore.ieee.org
This article investigates the security and reliability analysis for a novel satellite-terrestrial
network. Specifically, a satellite attempts to transmit confidential information to a ground user …

Performance enhancement for full-duplex relaying with time-switching-based SWIPT in wireless sensors networks

PT Tin, TN Nguyen, DH Tran, M Voznak, VD Phan… - Sensors, 2021 - mdpi.com
Full-duplex (FD) with simultaneous wireless information and power transfer (SWIPT) in
wireless ad hoc networks has received increased attention as a technology for improving …

Outage analysis of the power splitting based underlay cooperative cognitive radio networks

PT Tin, VD Phan, TN Nguyen, LT Tu, BV Minh… - Sensors, 2021 - mdpi.com
In the present paper, we investigate the performance of the simultaneous wireless
information and power transfer (SWIPT) based cooperative cognitive radio networks …

Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

P Tran Tin, TN Nguyen, NQ Sang, T Trung Duy… - Entropy, 2019 - mdpi.com
In this paper, we propose a rateless codes-based communication protocol to provide
security for wireless systems. In the proposed protocol, a source uses the transmit antenna …

Residual energy analysis in cognitive radios with energy harvesting UAV under reliability and secrecy constraints

W Khalid, H Yu, S Noh - Sensors, 2020 - mdpi.com
The integration of unmanned aerial vehicles (UAVs) with a cognitive radio (CR) technology
can improve the spectrum utilization. However, UAV network services demand reliable and …

Reliability-security analysis for harvest-to-jam based multi-hop cluster MIMO networks using cooperative jamming methods under impact of hardware impairments

N Anh, N Minh, T Duy, T Hanh, H Hai - EAI Endorsed Transactions on …, 2021 - eudl.eu
In this paper, we consider harvest-to-jam based secure multi-hop cluster multi-input multi-
output networks, where a multi-antenna source sends its data to a multi-antenna destination …

Exploiting direct link in two-way half-duplex sensor network over block Rayleigh fading channel: upper bound ergodic capacity and exact SER analysis

PT Tin, TN Nguyen, M Tran, TT Trang, L Sevcik - Sensors, 2020 - mdpi.com
Relay communication, in which the relay forwards the signal received by a source to a
destination, has a massive consideration in research, due to its ability to expand the …

Artificial noise injection and its power loading methods for secure space-time line coded systems

J Joung, J Choi, BC Jung, S Yu - Entropy, 2019 - mdpi.com
In this paper, we consider a 2× 2 space-time line coded (STLC) system having two-transmit
and two-receive antennas. To improve the secrecy rate of the STLC system, in which an …