Secure Wireless Powered and Cooperative Jamming D2D Communications

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cooperative Strategies for Wireless-Powered Communications

Radio frequency (RF) energy transfer and harvesting has been intensively studied recently as a promising approach to significantly extend the lifetime of energy-constrained wireless networks. This technique has a great potential to provide relatively stable and continuous RF energy to devices wirelessly, it thus opened a new research paradigm, termed wireless-powered communication (WPC), which ...

متن کامل

Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SS...

متن کامل

Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Interne...

متن کامل

Secure Wireless Communications via Cooperative Transmitting

Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secret key with a new receiver at a random location, in the presence of passive eavesdroppers at unknown locations. Two spatial point processes, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Green Communications and Networking

سال: 2018

ISSN: 2473-2400

DOI: 10.1109/tgcn.2017.2763826