Comparative Analysis of LEACH Network Routing Protocol in Wireless Sensor Networks: A Survey
SK Barnwal, A Prakash - Wireless Personal Communications, 2024 - Springer
WSN having not a fixed architecture randomly deploys numerous sensing nodes over any
measuring area and the collected information are sent to the head nodes through wireless …
measuring area and the collected information are sent to the head nodes through wireless …
Reliability-security analysis for harvest-to-jam based multi-hop cluster MIMO networks using cooperative jamming methods under impact of hardware impairments
In this paper, we consider harvest-to-jam based secure multi-hop cluster multi-input multi-
output networks, where a multi-antenna source sends its data to a multi-antenna destination …
output networks, where a multi-antenna source sends its data to a multi-antenna destination …
Secrecy outage performance of multi-hop leach networks using power beacon aided cooperative jamming with jammer selection methods
In this paper, we evaluate secrecy performance of cooperative jamming (CJ) aided secure
transmission for Multi-hop Low-Energy Adaptive Clustering Hierarchy (M-LEACH) networks …
transmission for Multi-hop Low-Energy Adaptive Clustering Hierarchy (M-LEACH) networks …
Intercept probability analysis of cooperative cognitive networks using fountain codes and cooperative jamming
TT Duy, NT Binh, NL Nhat - EAI Endorsed Transactions on …, 2021 - publications.eai.eu
This paper evaluates intercept probability (IP) of a cooperative cognitive radio network.
Using Fountain codes, a secondary source continuously generates encoded packets, and …
Using Fountain codes, a secondary source continuously generates encoded packets, and …
Performance comparison between fountain codes-based secure MIMO protocols with and without using non-orthogonal multiple access
In this paper, we propose and evaluate the performance of fountain codes (FCs) based
secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in …
secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in …
Security-Reliability Tradeoff of Multi-hop Secure Communication Networks Using Fountain Codes and RIS-aided Cooperative Communication
This papers investigates security-reliability trade-off for multi-hop secure communication
networks using Fountain codes (FCs) and reconfigurable intelligent surface (RIS). In the …
networks using Fountain codes (FCs) and reconfigurable intelligent surface (RIS). In the …
A fountain-coding based cooperative jamming strategy for secure service migration in edge computing
M Cui, H Zhang, Y Huang, Z Xu, Q Zhao - Wireless Networks, 2021 - Springer
In 5G, users can easily enjoy services by accessing the edge devices (EDs) deployed
around the base stations. Generally, due to the uneven distribution and mobility of users …
around the base stations. Generally, due to the uneven distribution and mobility of users …
Secrecy rate analysis of opportunistic user scheduling in uplink networks with potential eavesdroppers
In this paper, we investigate two user scheduling algorithms (optimal user and threshold-
based user scheduling algorithms) when we consider potential eavesdroppers in an uplink …
based user scheduling algorithms) when we consider potential eavesdroppers in an uplink …
On the Security and Reliability Trade-off of the Satellite Terrestrial Networks with Fountain Codes and Friendly Jamming
The performance of the satellite-terrestrial network with Fountain codes (FCs) is conducted
in the present work. More precisely, the air-to-ground link is modeled according to the …
in the present work. More precisely, the air-to-ground link is modeled according to the …
Secrecy outage analysis in energy harvesting relay networks with a friendly jammer
Physical layer security is a suitable replacement or complement to the traditional
cryptography method for securing a wireless network. Physical layer security exploits the …
cryptography method for securing a wireless network. Physical layer security exploits the …