Transmitter selection for secrecy in frequency-selective fading with multiple eavesdroppers and wireless backhaul links
This article investigates the secrecy performance of sub-optimal transmitter selection and
optimal selection schemes in a system comprising multiple transmitters, multiple …
optimal selection schemes in a system comprising multiple transmitters, multiple …
Transmitter selection for secrecy against colluding eavesdroppers with backhaul uncertainty
Due to the exponential growth of interconnected devices and reduced cell coverage, beyond
fifth‐generation networks will be dense. Thus, instead of wired backhaul, wireless backhaul …
fifth‐generation networks will be dense. Thus, instead of wired backhaul, wireless backhaul …
Destination Scheduling for Secure Pinhole-Based Power-Line Communication
We propose an optimal destination scheduling scheme to improve the physical layer
security (PLS) of a power-line communication (PLC) based Internet-of-Things system in the …
security (PLS) of a power-line communication (PLC) based Internet-of-Things system in the …
Opportunistic User Scheduling for Secure RIS-aided Wireless Communications
In this paper, we provide expressions for the secrecy outage probability (SOP) for
suboptimal and optimal opportunistic scheduling schemes in a reconfigurable intelligent …
suboptimal and optimal opportunistic scheduling schemes in a reconfigurable intelligent …
A New Secrecy Metric for Relay-Eavesdropper Channel
M Xie, X Liu, S Zhao, Y Xiao… - … on Networking and …, 2024 - ieeexplore.ieee.org
This paper investigates a relay-eavesdropper channel with orthogonal components from the
source to the relay and from the source and relay to the destination, where the eavesdropper …
source to the relay and from the source and relay to the destination, where the eavesdropper …