بحث بسيط
السجلات المعروضة 1 -- 10 من 88
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
(
Elsevier B.V.
, 2016 , Report)
Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...
Relay-Assisted Primary and Secondary Transmissions in Cognitive Radio Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Article)
We assume a set of cognitive relay nodes that assists both primary and secondary transmissions in a time-slotted cognitive radio networks. To regulate the channel access of the various nodes in the network, we propose an ...
On the coexistence of a primary user with an energy harvesting secondary user: A case of cognitive cooperation
(
John Wiley and Sons Ltd
, 2016 , Article)
In this paper, we consider a cognitive scenario where an energy harvesting secondary user shares the spectrum with a primary user. The secondary source helps the primary source in delivering its undelivered packets during ...
Optimal power allocation and relay selection in two-way multi-relay cooperative communication
(2013 , Conference Paper)
In this paper, we investigate the power allocation in two-way multi-relay assisted cooperative network in which the relays operate in decode-and-forward (DF) protocol. In the proposed method for choosing the best relay ...
Impact of stochastic RF energy harvesting relay on wireless point-to-point network
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
In this paper, we study a general practical stochastic energy harvesting (EH) model where in, an EH relay is able to harvest energy from the radio frequency (RF) radiation in a super capacitor. The different aspects of ...
Secure Spatial Multiple Access Using Directional Modulation
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
In this paper, we introduce a secure multiple access scheme, which exploits the multipath structure of the channel to create a multi-user interference environment. The generated interference enables legitimate users to ...
Performance of eigenvalue based spectrum sensing in full-duplex cognitive radio networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Spectrum sensing is a key component in any cognitive radio network. Recently full-duplex communication, i.e., the ability to transmit and receive at the same time at the same frequency, has become feasible. Residual self ...
Distributed power control for carrier aggregation in cognitive heterogeneous 5G cellular networks
(
Springer Verlag
, 2015 , Conference Paper)
In this paper, we study the distributed optimal power allocation for the carrier aggregation in next generation (5G) cognitive radio networks. The presented study relies on the power control and carrier aggregation principles ...
A Survey on Mobile Crowd-Sensing and Its Applications in the IoT Era
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article Review)
Mobile crowd-sensing (MCS) is a new sensing paradigm that takes advantage of the extensive use of mobile phones that collect data efficiently and enable several significant applications. MCS paves the way to explore new ...
Secret communication on the Z-Channel with cooperative receivers
(
IEEE Computer Society
, 2017 , Conference Paper)
The discrete memoryless Z-Channel with a confidential message and a cooperative receiver (DM-ZC-CMCR) is considered. A noiseless one-sided rate-limited cooperation link exists between the two receivers. The secrecy level ...