Search
Now showing items 1-4 of 4
Physical layer secrecy performance of multiple antennas transmission with partial legitimate user CSI
(
Institution of Engineering and Technology
, 2019 , Article)
Conventional beamforming transmission techniques can enhance physical layer secrecy performance while requiring the full channel state information (CSI) of legitimate users and even that of eavesdroppers at the transmitter. ...
Throughput of a cooperative energy harvesting secondary user in cognitive radio networks
(
Wiley Blackwell
, 2016 , Article)
This paper investigates the maximum throughput of a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU). The SU is assumed to be an energy harvesting node, which harvests energy packets from the ...
Precoding-Aided Spatial Modulation for the Wiretap Channel with Relay Selection and Cooperative Jamming
(
Hindawi Limited
, 2018 , Article)
We propose in this paper a physical-layer security (PLS) scheme for dual-hop cooperative networks in an effort to enhance the communications secrecy. The underlying model comprises a transmitting node (Alice), a legitimate ...
Joint physical-application layer security for wireless multimedia delivery
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
In recent years, there have been increasing demands for the security of wireless multimedia applications. Essentially, wireless networks, compared to traditional wired networks, are more likely to suffer from malicious ...