Y Ni, H Zhao, Y Liu, J Wang, G Gui… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Reconfigurable intelligent surface (RIS) has been attracted lots of attention due to the fact that it can reconfigure propagation environment with low cost for resource-constrained …
DH Tashman, W Hamouda… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, secrecy performance is investigated over the cascaded fading channel for the κ-μ distribution. The probability density function (PDF) and the cumulative distribution …
Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based …
D Tashman, W Hamouda - Future Internet, 2021 - mdpi.com
In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is …
JA Obadha, PO Akuon, VK Oduol - IET Communications, 2022 - Wiley Online Library
Abstract 5G and future generation networks require physical layer security (PLS) to reinforce the security at the higher communication layers. A novel technique of securely transmitting …
In contrary to Shannon's ergodic capacity, the delay-constrained effective rate is used to define the maximum data rate of the real-time applications in 5G and beyond networks …
SÖ Ata, E Erdogan - International Journal of Communication …, 2020 - Wiley Online Library
Herein, we consider an underlay cognitive radio network (CRN) where mobile secondary user wishes to transmit a confidential information to the secondary destination in the …
The fifth-generation (5G) communications and beyond are expected to serve a huge number of devices and services. However, due to the fixed spectrum allocation policies, the need for …
In a wireless network, it is necessary to make the security of the network so high that eavesdroppers cannot intercept the messages. If a key message is divided into several …