|
|
|
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi...
ver más
|
|
|
|
|
|
|
Nida Zamir, Bakhtiar Ali, Muhammad Fasih Uddin Butt, Muhammad Awais Javed, Byung Moo Lee and Soon Xin Ng
In this contribution, we investigate the performance of an untrusted relaying system when Cooperative Jammers (CJs) are available. We propose two scenarios, Untrusted Relaying-aided Multiple Cooperative-Jammers-based Simultaneous Transmission (UR-MCJST) ...
ver más
|
|
|
|
|
|
|
Ziwei Yuan, Yanping Yang, Dong Wang and Xiaoping Ma
Low-altitude cellular-enabled Unmanned Aerial Vehicles (UAVs) provide potential supplementary platforms to assist air-to-ground cooperative communication. This paper investigates a joint safety information interaction scheme for a UAV-enabled network, wh...
ver más
|
|
|
|
|
|
|
Thanh-Nam Tran, Van-Cuu Ho, Thoai Phu Vo, Khanh Ngo Nhu Tran and Miroslav Voznak
The requirements of low latency, low cost, less energy consumption, high flexibility, high network capacity, and high data safety are crucial challenges for future Internet of Things (IoT) wireless networks. Motivated by these challenges, this study deal...
ver más
|
|
|
|
|
|
|
Yuan Ren, Yixuan Tan, Meruyert Makhanbet and Xuewei Zhang
Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies for improving spectral efficiency and energy efficiency, respectively. In this paper, we study the physical layer security of a wireless-powered full-dupl...
ver más
|
|
|
|
|
|
|
Xin Song, Lin Xia, Siyang Xu and Yue Wang
In this paper, the secure communication based on the full-duplex (FD) device-to-device (D2D) in cellular networks is proposed. For the proposed scheme, the novel model is established, in which a D2D user is played as a relay operating in FD mode to assis...
ver más
|
|
|
|
|
|
|
Carla E. Garcia, Mario R. Camana and Insoo Koo
Security is considered a critical issue in the deployment of 5G networks because of the vulnerability of information that can be intercepted by eavesdroppers in wireless transmission environments. Thus, physical layer security has emerged as an alternati...
ver más
|
|
|
|
|
|
|
Ning Du, Fasheng Liu and Yan Zang
Due to the broadcast nature of wireless media, all nodes in the coverage of a transmitter are capable of capturing its signals, thus wireless transmission is sensitive to wiretapping. Several existing schemes place an emphasis on secrecy rate improvement...
ver más
|
|
|
|
|
|
|
Weijia Lei and Meihui Zhan
-
|
|
|
|