Filters








259,050 Hits in 3.7 sec

Cooperative Wireless Communications and Physical Layer Security: State-of-the-Art

Vandana Milind Rohokale, Neeli Rashmi Prasad, Ramjee Prasad
2012 Journal of Cyber Security and Mobility  
Physical layer security (PLS) is the imminent security guarantee for the cooperative communication.  ...  Multiple-input multiple-output (MIMO) system is the best technique for the provision of communication diversity wherein multiple antennas are installed at the sender and receiver.  ...  Here, the cooperative beamforming mechanism is applied for the analysis of the spectrum efficiency of the cooperative communication system.  ... 
doi:10.13052/jcsm2245-1439.1235 fatcat:tb7kdqbyrfdaxghm24ytvb6vza

A REVIEW ON DISTRIBUTED BEAM FORMING TECHNIQUES -AN APPROACH IN WIRELESS RELAY NETWORKS

Megha G. Paserkar .
2014 International Journal of Research in Engineering and Technology  
Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy.  ...  The scheme is a two way approach that will not only provides security to the confidential messages, to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers,  ...  in it as a promising approach to communicate confidential messages and so the secrecy capacity is severely limited in wireless communications.  ... 
doi:10.15623/ijret.2014.0311071 fatcat:x2umrdqbdne5dfyzy33yojq5ue

Analyzing Amplify-and-Forward and Decode-and-Forward Cooperative Strategies in Wyner's Channel Model

Pengyu Zhang, Jian Yuan, Jianshu Chen, Jian Wang, Jin Yang
2009 2009 IEEE Wireless Communications and Networking Conference  
In addition, secrecy constraints in cooperative secure communication are discussed and are used to explain the differences in AF and DF scheme.  ...  Overall, our work establishes the utility of cooperation and compares each advantage of AF and DF scheme in facilitating secure communication over wireless channel.  ...  ACKNOWLEDGMENT The authors would like to thank China Broadband Wireless Research Center, ARTC, Motorola, for her kind support.  ... 
doi:10.1109/wcnc.2009.4917597 dblp:conf/wcnc/ZhangYCWY09 fatcat:hj5oes5lpffb3d3b6vxbat6nm4

It's Capacity, Stupid: International Assistance and National Implementation

Stacy D. VanDeveer, Geoffrey D. Dabelko
2001 Global Environmental Politics  
Scholars of international environmental politics need to learn more from the literature and practice in international development and economic assistance-the "successes" and the "failures."  ...  If international environmental agreements are to be implemented and the environment protected, we must know much more about how to build capacity.  ...  of the total US cooperative security effort.  ... 
doi:10.1162/152638001750336569 fatcat:wjelkx4kbrdhfehljzyjcbqt7u

THE EU-NATO PARTNERSHIP AND ENSURING INFORMATION SECURITY AND CYBERSECURITY: THEORY AND PRACTICE
PARTNERSTVO EU-NATO PRI ZAGOTAVLJANJU INFORMACIJSKE OZIROMA KIBERNETSKE VARNOSTI: TEORIJA IN PRAKSA

DAMJAN ŠTRUCL
2021 CONTEMPORARY MILITARY CHALLENGES  
With this paper, we wish to analyze the EU-NATO strategic partnership in ensuring security and defence in the contemporary security environment, based on a joint statement from 2016.  ...  Key words NATO-EU cooperation, security environment, information environment, cybersecurity, cyberspace.  ...  , as well as between the EU's Single Intelligence Analysis Capacity and NATO's Joint Intelligence and Security Division.  ... 
doi:10.33179/bsv.99.svi.11.cmc.23.2.2 fatcat:igkdhgzsbbeytgzbor7l5ncdjm

Fairness Queue for Energy Efficient Data Transmission in Wireless Sensor Network

Durga S. Nikam, Prof. Wankhade M. M.
2017 IJARCCE  
Proposed energy efficient network communication uses simulation for system analysis [2].  ...  In order to overcome malicious packets transmission in the network, proposed system uses Identity based online and Identity based Online/Offline security mechanism.  ...  RESULT ANALYSIS This work demonstrates the system model for Secure and energy efficient data packet transmission of sensor nodes in Wireless Sensor Network.  ... 
doi:10.17148/ijarcce.2017.6668 fatcat:bsgie6eqnnea7jo7ze7nhfkz6e

Vehicle Communication using Secrecy Capacity [article]

Na-Young Ahn, Donghoon Lee, Seong-Jun Oh
2018 arXiv   pre-print
We address secure vehicle communication using secrecy capacity.  ...  As a result, we can expect safer communication security of autonomous vehicles in 5G communications.  ...  The above V2V communication induces the enhancement of physical layer security due to cooperative relay communication based on secrecy capacity.  ... 
arXiv:1807.09757v1 fatcat:juqprzhqpfa2llepmycpkp4kpy

A Survey on Cooperative Jamming Applied to Physical Layer Security

Michael Atallah, Georges Kaddoum, Long Kong
2015 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)  
Security has always played a critical role in wireless cooperative communication systems design. Eavesdropping and jamming are two common threats to the information security in wireless networks.  ...  However, jamming can be used in a cooperative manner to enable a secure communication link between the legitimate transmitter and the intended receiver.  ...  Interference, in general, is regarded as undesired phenomenon in wireless communications. But in secure communications, interference can benefit the system if it is used in a proper way.  ... 
doi:10.1109/icuwb.2015.7324413 dblp:conf/icuwb/AtallahKK15 fatcat:x6vyqvd4zjfxzfyzzyvbmscb4q

The Physical Layer Security Beamforming Method based on Large-scale Multi-antenna

Zhou Wen-gang, Li Jing, Guo Hui-ling
2016 International Journal of Future Generation Communication and Networking  
In general, said the capacity can be achieved secret channel coding for the security code.  ...  information system security, the simulation results demonstrate the ability to secure transmission algorithms can effectively improve the system. 309 deterioration of the eavesdropper channel interference  ...  Acknowledgments This work is supported by the research projects of Henan province under Grant 162102210395, the science and technology innovation team in Colleges and universities of Henan province plan  ... 
doi:10.14257/ijfgcn.2016.9.7.29 fatcat:2yw7mn3bqfeahfq3ih3gd5ywda

PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL

Vaibhav Kumar Gupta, Poonam Jindal
2014 ICTACT Journal on Communication Technology  
The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy.  ...  In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical layer security (PLS) techniques.  ...  The comparative analysis of the system performance in terms of secrecy rate with respect to system parameters has been presented for various cooperation protocols i.e. DF, AF and CF.  ... 
doi:10.21917/ijct.2014.0133 fatcat:lcizbkocxffvdcm6jgtc5iqeci

Physical layer security via maximal ratio combining and relay selection over Rayleigh fading channels

Bin Zhong, Minggang Wu, Tong Li, Zhongshan Zhang
2015 Science China Information Sciences  
In this paper, the impact of both maximal ratio combining (MRC) and relay selection on the physical layer security in wireless communication systems is investigated by analyzing critical issues such as  ...  Keywords average secrecy capacity, cooperative communication, maximal ratio combining, outage probability, physical layer security Citation Zhong B, Wu M G, Li T, et al.  ...  Conflict of interest The authors declare that they have no conflict of interest.  ... 
doi:10.1007/s11432-015-5406-7 fatcat:6qqbjlcgljbmpcit5z5t7uxlei

Promising Pathways for Regional Disease Surveillance Networks

Melinda Moore, Katherine C. Bond, Louise Gresham, Mark Rweyemamu, A. Mushtaque R. Chowdhury, Silvia Bino
2013 Emerging Health Threats Jour  
The OIE capability monitoring system is embodied in the Performance of Veterinary Services (PVS), which operates through a four-stage Pathway that includes evaluation, gap analysis, capacity building and  ...  The IHR defines core capacities related to surveillance, response, preparedness, risk communication, human resources, laboratory and coordination.  ... 
doi:10.3402/ehtj.v6i0.19961 pmid:23362416 pmcid:PMC3557953 fatcat:kdwq3lpnffhttflnk2yjhquiru

Joint Relay and Eavesdropper Selection Strategy against Multiple Eavesdroppers over Nakagami-m Fading Channels in Cooperative Decode-and-Forward Relay Networks

Qian Guo, Wei Feng
2019 IEEE Access  
to a more general case in a cooperative DF relay network.  ...  Physical layer security (PLS) in the presence of multiple eavesdroppers over Nakagami-m fading channels for cooperative decode-and-forward (DF) relay network that consists of one source, one destination  ...  Shannon [4] proved that there is an optimal secure communication system.  ... 
doi:10.1109/access.2019.2906639 fatcat:femr46h4qbfbnjdjlfrwn2xdga

Secure Transmission Method of Spectrum Watermark for Fine-grained Spectrum Management

Yu Zhang, Yong Chen, Weiwei Yang, Yueming Cai, Guojie Hu, XiaoQiang Qiao
2020 IEEE Access  
The spectrum watermark for identifying the radio system is hidden in the normal communication signal via adjusting the embedding parameters, and has no effect on the required transmission performance.  ...  The analysis and simulation results show that the proposed method achieves the optimal and secure transmission of the spectrum watermark by adjusting the embedding parameters of the spectrum watermark  ...  His current research interests include MIMO systems, OFDM systems, signal processing in communications, cooperative communications, and wireless sensor networks.  ... 
doi:10.1109/access.2020.2980867 fatcat:g4fbzgtc7rbnbgiyollbxd2o44

Physical Layer Security in Vehicular Communication Networks in the Presence of Interference [article]

Abubakar U. Makarfi, Rupak Kharel, Khaled M. Rabie, Omprakash Kaiwartya, Galymzhan Nauryzbayev
2019 arXiv   pre-print
This paper studies the physical layer security of a vehicular communication network in the presence of interference constraints by analysing its secrecy capacity.  ...  We present the standard logarithmic expression for the system capacity in an alternate form, to facilitate analysis in terms of the joint moment generating functions (MGF) of the random variables representing  ...  Physical layer security has also been invetigated in power-line communication (PLC) systems for cooperative relaying [7] and over correlated log-normal cooperative PLC channels [8] , as well as for  ... 
arXiv:1911.07977v1 fatcat:nuiclxswpngudehdkahbywjg54
« Previous Showing results 1 — 15 out of 259,050 results