Search
Now showing items 11-20 of 41
Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Physical layer security has attracted research attention as a means to achieve secure communication without the need for complicated upper layer encryption techniques. The secure degrees of freedom (SDoF) of various networks ...
An efficient algorithm for dense network flow maximization with multihop backhauling and NFPs
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Network densification is promising to achieve higher data rates and higher network capacity, while causing new backhauling challenges especially when the network is highly dense. The flexible and cost efficient backhauling ...
On the delay of finite buffered multi-hop relay wireless internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The evolution of Internet of Things (IoT) as a new application in wireless networks mandates the utilization of wireless cooperative relaying to overcome the energy limitations of IoT devices. Multi-hop relaying is a ...
Proactive power allocation and caching node selection for regular service guarantees
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
This paper studies the potential of proactive resource allocation to prolong the communication sessions in networks with limited energy budgets and stringent quality-of-service (QoS) requirement, particularly a regular ...
Optimal cooperative cognitive relaying and spectrum access for an energy harvesting cognitive radio: Reinforcement learning approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper, we consider a cognitive setting under the context of cooperative communications, where the cognitive radio (CR) user is assumed to be a self-organized relay for the network. The CR user and the primary user ...
Non-data-aided SNR estimation for QPSK modulation in AWGN channel
(
IEEE Computer Society
, 2014 , Conference Paper)
Signal-to-noise ratio (SNR) estimation is an important parameter that is required in any receiver or communication systems. It can be computed either by a pilot signal data-aided approach in which the transmitted signal ...
Robust secret key extraction from channel secondary random process
(
John Wiley and Sons Ltd
, 2016 , Conference Paper)
The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
Power-optimal feedback-based random spectrum access for an energy harvesting cognitive user
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper, we study and analyze cognitive radio networks in which secondary users (SUs) are equipped with energy harvesting (EH) capability. We design a random spectrum sensing and access protocol for the SU that ...
Characterization of the indoor-outdoor radio propagation channel at 2.4 GHz
(
IEEE
, 2011 , Conference Paper)
We present the site-specific signal strength measurement results for path loss, shadowing, and fading in 2.4GHz band under typical harsh environment (high temperature 4050 C and humidity 8090%). We use spectrum analyzer ...
Secret key generation based on channel and distance measurements
(
IEEE Computer Society
, 2014 , Conference Paper)
Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...