In many real-time applications, timely delivery of data is essential along with guarantees of reliability and secrecy. To address this problem, this work considers a Rayleigh fading …
This paper explores the role of multiple antennas in mitigating jamming attacks for the Rayleigh fading environment with exogenous random traffic arrival. The jammer is assumed …
P Mohapatra, N Pappas - Physical‐Layer Security for 6G, 2024 - Wiley Online Library
In many real‐time applications, timely data delivery and guarantees of reliability and secrecy are essential. In 5G and future wireless communication technology, it is required to support …
A Arvanitaki, G Stamatakis, N Carlsson… - … on Modeling and …, 2023 - ieeexplore.ieee.org
In this work, we investigate the dynamic power management problem in a two-user secure broadcast channel scenario where the information at the source is kept in two separate …
P Mohapatra, N Pappas - Physical‐Layer Security for 6G, 2024 - Wiley Online Library
With the emergence of 5G technology, there has been increased interest in exploring the impact of secrecy on throughput and latency. Many forthcoming applications necessitate …
In this paper, we consider the two-user broadcast channel with security constraints. We assume that a source broadcasts packets to two receivers, and that one of them has secrecy …
In this paper, we analyze the impact of caching on the performance of a cache enabled system with heterogeneous traffic where one of the users need to be served with confidential …
In this paper, we investigate and analyze the performance of a wireless system with caching capabilities while imposing secrecy constraints at one of the users. A dedicated user with …