السجلات المعروضة 2119 -- 2138 من 2495

    • Secrecy outage analysis over random beamforming transmission with user scheduling: Collusion vs. exclusion 

      Bao T.; Yang H.-C.; Hasna , Mazen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      In this letter, we study the interacting effects of the exclusion zone and eavesdropper colluding strategy on the secrecy performance of multiple-antenna transmission system. In particular, a base station (BS) applies ...
    • Secrecy outage performance analysis of massive MIMO transmission with multiple non-colluding eavesdroppers and partial legitimate user CSI 

      Bao T.; Yang H.-C.; Hasna M.O. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Random unitary beamforming (RUB) can reduce the implementation complexity of massive multiple- input singleoutput (MIMO) downlink transmission by only requiring partial channel state information (CSI) at the transmitter. ...
    • Secrecy Outage Performance of Ground-to-Air Communications with Multiple Aerial Eavesdroppers and Its Deep Learning Evaluation 

      Bao T.; Zhu J.; Yang H.-C.; Hasna , Mazen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      In this letter, we study the secure information transmission from a ground base station (GBS) to a legitimate unmanned aerial vehicle (UAV) user, in the presence of multiple UAV eavesdroppers. To enhance the secrecy ...
    • Secrecy Performance Analysis of Cooperative NOMA system with multiple DF Relays 

      Zaghdoud N.; Mnaouer A.B.; Boujemaa H.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      In this paper, we derive the Secrecy Outage Probability (SOP) and Strictly Positive Secrecy Capacity (SPSC) of cooperative Non Orthogonal Multiple Access (NOMA) in the presence of K Decode and Forward (DF) relays and ...
    • Secrecy performance analysis of half/full duplex AF/DF relaying in NOMA systems over κ−μ fading channels 

      Zaghdoud N.; Mnaouer A.B.; Boujemaa H.; Touati F. ( Springer , 2022 , Article)
      Although the progress in understanding 5G and beyond techniques such as Non-Orthogonal Multiple Access (NOMA) and full-duplex techniques has been overwhelming, still analyzing the security aspects of such systems under ...
    • Secrecy Performance Analysis of Multi-Antenna NOMA System with AF/DF relaying under External and Internal Eavesdropping Scenarios 

      Zaghdoud N.; Mnaouer A.B.; Alouane W.H.; Boujemaa H.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple Access (NOMA) users have the capability of decoding the other paired users sharing the same resource bloc. As a result, NOMA technique ...
    • Secrecy Performance Analysis of RIS-Aided Wireless Communication Systems 

      Yang L.; Yang J.; Xie W.; Hasna , Mazen; Tsiftsis T.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      In this work, we study the secrecy performance of a reconfigurable intelligent surfaces (RIS)-aided wireless communication system in the presence of an eavesdropping user. Specifically, we assume that the RIS is placed ...
    • Secrecy performance of AF relaying in cooperative NOMA over rician channel 

      Zaghdoud N.; Alouane W.H.; Boujemaa H.; Mnaouer A.B.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      In this paper, we investigate the secrecy performance of an Amplify-and-Forward (AF) relay in a cooperative NOMA system. The AF relay ensures the transmission of the signal in the presence of one passive eavesdropper where ...
    • Secrecy Performance of Cooperative NOMA System with Multiple Full-Duplex Relays against Non-Colluding/Colluding Eavesdroppers 

      Zaghdoud N.; Mnaouer A.B.; Boujemaa H.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      In 5G and beyond wireless communication net-works, non-orthogonal multiple access (NOMA) and Full-Duplex (FD) techniques are considered as promising key techniques. However, the secrecy in NOMA systems has proven to be ...
    • Secrecy Performance of Full-Duplex Jamming and Reception under I/Q Imbalance 

      Samara, Lutfi; Hamila, Ridha; Al-Dhahir, Naofal ( IEEE , 2021 , Article)
      Investigating the physical layer security performance of full-duplex (FD) radio transceivers has been the subject of numerous research studies. However, self-interference cancellation that enables full exploitation of FD ...
    • Secret communication on the Z-Channel with cooperative receivers 

      Fayed, Abdallah; Khattab, Tamer; Lai, Lifeng ( IEEE Computer Society , 2017 , Conference Paper)
      The discrete memoryless Z-Channel with a confidential message and a cooperative receiver (DM-ZC-CMCR) is considered. A noiseless one-sided rate-limited cooperation link exists between the two receivers. The secrecy level ...
    • Secure AF Relaying in Power-Constrained UAV Networks 

      Samara, Lutfi; AlAbbasi, Abubakr O.; El Shafie, Ahmed; Hamila, Ridha; Al-Dhahir, Naofal ( IEEE , 2021 , Conference Paper)
      This paper proposes a secure amplify-and-forward (AF) relaying scheme in unmanned aerial vehicle (UAV) networks while accounting for the power consumption limitations of UAVs. Since a UAV's battery life is limited, we ...
    • Secure Communications Using Directional Modulation 

      Hafez, Mohammed; Khattab, Tamer; El-Fouly, Tarek; Arslan, Hüseyin ( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Conference Paper)
      Limitations on the wireless communication resources (i.e., time and frequency) introduces the need for another domain that can help communication systems to match the increasing demand on high data transfer rates and quality ...
    • Secure compressive sensing for ECG monitoring 

      Djelouat, Hamza; Amira, Abbes; Bensaali, Faycal; Boukhennoufa, Issam ( Elsevier , 2020 , Article)
      With the proliferation of wearable wireless sensors and adequate communication protocols, the internet of things (IoT) started to shape the healthcare sector into a new frame of connection between patients with health ...
    • Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only 

      Amir M.; Khattab T.; Yaacoub E.; Abualsaud K.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Physical layer security has attracted research attention as a means to achieve secure communication without the need for complicated upper layer encryption techniques. The secure degrees of freedom (SDoF) of various networks ...
    • Secure half-duplex dual-hop AF relaying networks with partial relay selection 

      Mallat, Walid; Alouane, Wided Hadj; Boujemaa, Hatem; Touati, Farid ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      In this paper, we focus on the half-duplex (HD) relaying with partial relay selection (PRS) scheme using destination-assisted jamming (DAJ). We consider one source (S), one destination (D), one passive eavesdropper and ...
    • Secure Medical Data Sharing for Healthcare System 

      Chkirbene, Zina; Hamila, Ridha; Erbad, Aiman ( IEEE , 2022 , Conference Paper)
      A new generation of advanced information technologies are used nowadays by healthcare systems to provide access to affordable and high-quality healthcare services. However, such services, generally require a large amount ...
    • Secure mHealth IoT data transfer from the patient to the hospital: A three-tier approach 

      Yaacoub E.; Abualsaud K.; Khattab T.; Guizani M.; Chehab A. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      eHealth and mHealth applications are gaining increasing importance with advances in the IoT and the ubiquity of sensor deployments. Measured IoT mHealth data needs to be captured, transmitted, and stored securely, without ...
    • Secure multiple-users transmission using multi-path directional modulation 

      Hafez, Mohammed; Khattab, Tamer; Elfouly, Tarek; Arslan, Huseyin ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This work introduces a physical-layer secure multiple-users communication scheme. Our scheme employs the multi-path nature of the wireless channel to provide a different secure communication link for each of the legitimate ...
    • Secure Performance Analysis for Full-Duplex Cooperative NOMA System in the Presence of Multiple Eavesdroppers 

      Zaghdoud N.; Mnaouer A.B.; Alouane W.H.; Boujemaa H.; Touati F. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      This paper investigates the physical layer security of a full-duplex (FD) Decode-and-Forward (DF) NOMA network assumed to undergo independent and identically distributed Nakagami-m fading. Herein, we provide a secrecy ...