Two-step transmission with artificial noise for secure wireless SIMO communications

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Artificial Noise Based Secure Transmission Scheme in Multiple Antenna Systems

We consider a secure transmission from a transmitter with multiple antenna to a desired receiver with a single antenna in the presence of an eavesdropper. In order to increase the secrecy rate performance, we propose an artificial noise (AR) based secure transmission scheme. Usually, in conventional schemes, transmission power reserved for the AR has been equally allocated to all orthonormal ba...

متن کامل

Secure Group Communications for Wireless Networks

In this paper we consider the problem of key management in a highly-mobile wireless networking environment, such as a dynamic, distributed setting in which command and control nodes move along with individual users. In this scenario, data must be securely multicast from one source to many users, requiring that users be properly keyed. Furthermore, because users move in and out of the session (d...

متن کامل

Secure Communications over Wireless Channels

In this work, we present new techniques that leverage the wireless medium in facilitating secure communications in the presence of eavesdroppers. First, we consider the secure transmission of information over an ergodic fading channel with long coherence intervals. The secrecy capacity of such a system is characterized under different assumptions on the available channel state information. We t...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements

As the fast development of Bluetooth networks and wireless communications, the mobile devices share information with each other easier than ever before. However, the handy communication technology accompanies privacy and security issues. Nowadays, a Bluetooth adopts peer-to-peer and Frequency Hopping Spread Spectrum (FHSS) mechanisms to avoid data reveal, but the malicious attacks collect the t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science China Information Sciences

سال: 2015

ISSN: 1674-733X,1869-1919

DOI: 10.1007/s11432-014-5256-8