نتایج جستجو برای: secure communications
تعداد نتایج: 133581 فیلتر نتایج به سال:
in this paper, we consider a cooperative cognitive radio network in which there is an ofdm primary link and multiple single carrier secondary links.the primary link is required to maintain its secrecy rate above a predefined threshold. if the secrecy rate requirement is not satisfied, the secondary system help primary link to maintain its secrecy rate requirement. in doing so, the secondary trans...
in this paper, we consider a cooperative cognitive radio network in which there is an ofdm primary link and multiple single carrier secondary links.the primary link is required to maintain its secrecy rate above a predefined threshold. if the secrecy rate requirement is not satisfied, the secondary system help primary link to maintain its secrecy rate requirement. in doing so, the secondary trans...
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
Unmanned aerial vehicles (UAVs) communications have been widely exploited in our daily life, which leads to rising concerns about the security issue. This work investigates secrecy performance of a UAV-to-vehicle (UAV-2-V) communication system, where information delivered over both downlink and uplink between UAV ( <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http...
Exploiting short packets for communications is one of the key technologies realizing emerging application scenarios such as massive machine type (mMTC) and ultra-reliable low-latency (uRLLC). In this paper, we investigate short-packet to provide both reliability security guarantees simultaneously with an eavesdropper. particular, outage probability considering secrecy defined according characte...
Data protection and information security have been the essence of communication in today's digital era. Authentication secrecy secure are achieved using key-based cryptographic primitives; which significantly relies upon underlying computationally complex mathematics. Moreover, these existing primitives considered to be non-deterministic on basis computational capabilities. However, considerabl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید