Comparative Analysis of LEACH Network Routing Protocol in Wireless Sensor Networks: A Survey

SK Barnwal, A Prakash - Wireless Personal Communications, 2024 - Springer
WSN having not a fixed architecture randomly deploys numerous sensing nodes over any
measuring area and the collected information are sent to the head nodes through wireless …

Reliability-security analysis for harvest-to-jam based multi-hop cluster MIMO networks using cooperative jamming methods under impact of hardware impairments

N Anh, N Minh, T Duy, T Hanh, H Hai - EAI Endorsed Transactions on …, 2021 - eudl.eu
In this paper, we consider harvest-to-jam based secure multi-hop cluster multi-input multi-
output networks, where a multi-antenna source sends its data to a multi-antenna destination …

Secrecy outage performance of multi-hop leach networks using power beacon aided cooperative jamming with jammer selection methods

HD Hung, TT Duy, M Voznak - AEU-International Journal of Electronics and …, 2020 - Elsevier
In this paper, we evaluate secrecy performance of cooperative jamming (CJ) aided secure
transmission for Multi-hop Low-Energy Adaptive Clustering Hierarchy (M-LEACH) networks …

Intercept probability analysis of cooperative cognitive networks using fountain codes and cooperative jamming

TT Duy, NT Binh, NL Nhat - EAI Endorsed Transactions on …, 2021 - publications.eai.eu
This paper evaluates intercept probability (IP) of a cooperative cognitive radio network.
Using Fountain codes, a secondary source continuously generates encoded packets, and …

Performance comparison between fountain codes-based secure MIMO protocols with and without using non-orthogonal multiple access

D The Hung, T Trung Duy, PT Tran, D Quoc Trinh… - Entropy, 2019 - mdpi.com
In this paper, we propose and evaluate the performance of fountain codes (FCs) based
secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in …

Security-Reliability Tradeoff of Multi-hop Secure Communication Networks Using Fountain Codes and RIS-aided Cooperative Communication

VT Ty, TT Duy, LT Tu, TT Nguyen… - 2023 International …, 2023 - ieeexplore.ieee.org
This papers investigates security-reliability trade-off for multi-hop secure communication
networks using Fountain codes (FCs) and reconfigurable intelligent surface (RIS). In the …

A fountain-coding based cooperative jamming strategy for secure service migration in edge computing

M Cui, H Zhang, Y Huang, Z Xu, Q Zhao - Wireless Networks, 2021 - Springer
In 5G, users can easily enjoy services by accessing the edge devices (EDs) deployed
around the base stations. Generally, due to the uneven distribution and mobility of users …

Secrecy rate analysis of opportunistic user scheduling in uplink networks with potential eavesdroppers

I Bang, BC Jung - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate two user scheduling algorithms (optimal user and threshold-
based user scheduling algorithms) when we consider potential eavesdroppers in an uplink …

On the Security and Reliability Trade-off of the Satellite Terrestrial Networks with Fountain Codes and Friendly Jamming

QS Nguyen, TD Tran, LN Nguyen… - … on Industrial Networks …, 2023 - publications.eai.eu
The performance of the satellite-terrestrial network with Fountain codes (FCs) is conducted
in the present work. More precisely, the air-to-ground link is modeled according to the …

Secrecy outage analysis in energy harvesting relay networks with a friendly jammer

H Webb, C Yin, DN Nguyen, TTN Le… - … on Recent Advances …, 2020 - ieeexplore.ieee.org
Physical layer security is a suitable replacement or complement to the traditional
cryptography method for securing a wireless network. Physical layer security exploits the …