بحث بسيط
السجلات المعروضة 1 -- 4 من 4
Throughput of a cooperative energy harvesting secondary user in cognitive radio networks
(
Wiley Blackwell
, 2016 , Article)
This paper investigates the maximum throughput of a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU). The SU is assumed to be an energy harvesting node, which harvests energy packets from the ...
Secure multiple-users transmission using multi-path directional modulation
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This work introduces a physical-layer secure multiple-users communication scheme. Our scheme employs the multi-path nature of the wireless channel to provide a different secure communication link for each of the legitimate ...
Robust secret key extraction from channel secondary random process
(
John Wiley and Sons Ltd
, 2016 , Conference Paper)
The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
(
Elsevier B.V.
, 2016 , Report)
Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...