With the expansion of IoT and device-to-device communication applications, the security and privacy of the information have been kept at the forefront. The existence of a secondary …
In this paper, we investigate a secure dual-hop radio frequency-free space optical (RF-FSO) mixed variable gain relaying framework in the presence of a single eavesdropper. The RF …
In this letter, the secrecy performance of a decode-and-forward (DF) principle based mixed free space optics (FSO) and radio frequency (RF) system is analyzed. The analysis is done …
In this paper, the physical layer secrecy (PLS) performance of a dual hop two way relaying (TWR) based mixed free space optics (FSO)/radio frequency (RF) system is investigated …
C Ouyang, S Wu, C Jiang, J Cheng… - IEEE Communications …, 2020 - ieeexplore.ieee.org
Physical layer security is investigated over mixture Gamma (MG) distributed fading channels with discrete inputs. By the Gaussian quadrature rules, closed-form expressions are derived …
SÖ Ata, E Erdogan - International Journal of Communication …, 2020 - Wiley Online Library
Herein, we consider an underlay cognitive radio network (CRN) where mobile secondary user wishes to transmit a confidential information to the secondary destination in the …
S Das, A Bhattacharya - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
In a wireless channel, shadow fading along with multipath effect causes random fluctuations of the received signal strength at the receiver. Several composite fading distributions are …
With the advancement of new technologies, high data rate is considered as the primary requirement of all the communication systems. Maximum data transportation capability of the …
In this paper, wireless sensor network (WSN) security issue in the presence of an eavesdropper is analysed. The sensor-sink as well as sensor-eavesdropper channels are …