Zobrazeno 1 - 10
of 354
pro vyhledávání: '"Pinyi Ren"'
Publikováno v:
Tongxin xuebao, Vol 41, Pp 52-63 (2020)
Considering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,an
Externí odkaz:
https://doaj.org/article/813d770b7fcf4f4a811fd7623b804f29
Autor:
Dongyang Xu, Pinyi Ren
Publikováno v:
IEEE Open Journal of the Computer Society, Vol 1, Pp 193-208 (2020)
Grant-free multiple access is a critical mechanism introduced in 5G new radio (NR) to support ultra-reliable low-latency communication (URLLC) services. Pilot authentication (PA) is a key security mechanism to guarantee reliable performance of grant-
Externí odkaz:
https://doaj.org/article/5e692b4e24614050a3f023a2b382ead2
Publikováno v:
IEEE Access, Vol 8, Pp 140981-140997 (2020)
In this paper we study the secrecy performance of a downlink massive multiple-input multiple-output (MIMO) system in the presence of pilot spoofing attack (PSA). Specifically, the base station (BS), which is equipped with low-resolution analog-to-dig
Externí odkaz:
https://doaj.org/article/141837006cee4afbb76d26f32ff9ec2a
Publikováno v:
IEEE Access, Vol 8, Pp 140467-140477 (2020)
Pilot-assisted channel training for acquiring the channel state information (CSI) is a very critical functionality in URLLC to ensure reliable data transmission. In this paper, we consider the joint uplink and downlink URLLC transmission in which the
Externí odkaz:
https://doaj.org/article/89da6b7740b149c0aa1c83b6bb82fb20
Autor:
Hongliang He, Pinyi Ren
Publikováno v:
IEEE Access, Vol 7, Pp 34533-34540 (2019)
Due to the broadcast nature of wireless device-to-device networks, the transmission of private information is threatened by the exterior eavesdropping. Targeting at this problem, we jointly exploit the Wyner's code and the linear network coding, in t
Externí odkaz:
https://doaj.org/article/9c9311447eca42ceb7414ca8917fbbca
Publikováno v:
IEEE Access, Vol 7, Pp 129387-129401 (2019)
The characteristic of heterogeneous power utilization in device-to-device (D2D) enabled cellular networks provides a natural fit for the adoption of non-orthogonal multiple access (NOMA). It contributes to a novel D2D framework, NOMA based cooperativ
Externí odkaz:
https://doaj.org/article/d2eb95b5fb424f8f98eb9a8981315296
Publikováno v:
Symmetry, Vol 14, Iss 4, p 801 (2022)
In the era of Industry 4.0, there are many emerging industrial Internet of Things (IIoT) applications that require ultrareliable and low-latency communications (URLLCs), such as time-sensitive networking (TSN), status reporting, and remote control. W
Externí odkaz:
https://doaj.org/article/9721493be06b46aa9f5cdbc24a7a5ded
Publikováno v:
IEEE Access, Vol 6, Pp 5766-5779 (2018)
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate transmission, known as the reactive jamming. Compared with the conventional constant jamming model, t
Externí odkaz:
https://doaj.org/article/5e31d4e3df2e492aa441a0511f69f6af
Publikováno v:
IEEE Access, Vol 5, Pp 24632-24645 (2017)
Information security is of paramount importance yet significant challenge for wireless communications. In this paper, we investigate the power-efficient transmissions with security concerns in the presence of a full-duplex (FD) active eavesdropper. W
Externí odkaz:
https://doaj.org/article/d8c9136039b9459e809f964af2d1d462
Publikováno v:
IEEE Access, Vol 5, Pp 3763-3776 (2017)
Secure the cooperative transmission is studied for an automatic repeat request (ARQ)-based wireless network against a jamming-aided eavesdropper. The eavesdropper utilizes the jamming attack to assist its eavesdropping by forcing the legitimate trans
Externí odkaz:
https://doaj.org/article/1cb5da6056374cde9cf3163904c585a5