Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be …
Unmanned aerial vehicles (UAVs) have stroke great interested both by the academic community and the industrial community due to their diverse military applications and …
To provide high data rate for high-speed trains (HSTs), it is required to use emerging wireless communication systems, such as the fifth generation (5G). An asymmetric 5G …
Physical layer security is a promising approach that can benefit traditional encryption methods. The idea of physical layer security is to take advantage of the propagation …
A Pandey, S Yadav - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a dual-hop cooperative relaying network, where a source node communicates with a destination node via an amplify-and …
Wireless systems have become an increasingly pivotal part of our lives. Various critical applications and use cases such as healthcare, financial transactions, e-commerce …
X Li, M Huang, C Zhang, D Deng, KM Rabie… - IEEE …, 2019 - ieeexplore.ieee.org
In this paper, we investigate the reliability and security performance of cooperative multi- relay systems, where both source and relay nodes are energy-constrained nonlinear energy …
This contribution provides experimental evidence for the two-wave with diffuse power (TWDP) fading model. We have conducted two indoor millimetre wave measurement …
Non‐orthogonal multiple access (NOMA) is recognised as an improved multiple access technique as compared with OMA technique to fulfil the requirements of fifth‐generation …