Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Liwei Tao"'
Publikováno v:
Complexity, Vol 2022 (2022)
In this work, we investigated a covert communication method in wireless networks, which is realized by multiantenna full-duplex single relay. In the first stage, the source node sends covert messages to the relay, and the relay uses a single antenna
Externí odkaz:
https://doaj.org/article/a7959d9ee995457f8a7f5eeac449caea
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 17 (2021)
This article studies the physical layer security in a downlink full-duplex cognitive non-orthogonal multiple access sensor networks (FD-C-NOMA). Compared with the existing works, this article proposes a FD-C-NOMA transmission scheme with a primary us
Externí odkaz:
https://doaj.org/article/efc4ac4917874badae4c39dc5fe563bf
Publikováno v:
IEEE Access, Vol 7, Pp 31218-31232 (2019)
The use of relay can expand the coverage of millimeter-wave (mmWave) signals, whereas it may increase the risk of information leakage due to the additional link from source to relay. In this paper, we consider a secure communication in the mmWave ran
Externí odkaz:
https://doaj.org/article/00b84c8d19ed4b12997588151a4dfefb
Publikováno v:
IEEE Access, Vol 7, Pp 35851-35862 (2019)
Millimeter-wave (mmWave) communication is the rising technology for simultaneous wireless information and power transfer (SWIPT) unmanned aerial vehicle (UAV)-based relay networks for the abundant bandwidth and short wavelength. However, the secrecy
Externí odkaz:
https://doaj.org/article/59e68138df704467a4169d9b027df3eb
Publikováno v:
IEEE Access, Vol 7, Pp 32681-32692 (2019)
To meet ever-increasing mobile data traffic demands for next-generation wireless communication systems, the plentiful spectrum resources in millimeter wave (mmWave) band have been exploited to improve the system capacity. This paper investigates phys
Externí odkaz:
https://doaj.org/article/dcf93617a7a5423f8ea4399660782404
Publikováno v:
Applied Sciences, Vol 10, Iss 5, p 1840 (2020)
This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), whi
Externí odkaz:
https://doaj.org/article/0eb070ff382e4e3fa4aad4e5c041ecd1
Publikováno v:
China Communications. 20:217-231
Publikováno v:
IEEE Transactions on Vehicular Technology. 71:2170-2175
Publikováno v:
IEEE Transactions on Vehicular Technology. 71:533-544
This paper investigates covert communications with finite blocklength in the presence of multiple randomly distributed wardens, which are modeled as a Poisson point process (PPP). Specifically, the protection area, which is guarded by the transmitter
Publikováno v:
IEEE Communications Letters. 25:3785-3789
This letter investigates covert communication in uplink NOMA systems assisted by an energy harvesting jammer (EHJ), where a reliability-required user (RRU) and a covertness-required user (CRU) are paired to perform NOMA to transmit messages to Bob, i