Cao et al., 2023 - Google Patents
Physical-layer security for intelligent-reflecting-surface-aided wireless-powered communication systemsCao et al., 2023
- Document ID
- 15383568680069996868
- Author
- Cao K
- Ding H
- Lv L
- Su Z
- Tao J
- Gong F
- Wang B
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
This article investigates physical-layer security (PLS) of a typical wireless-powered communication (WPC) system with the aid of intelligent reflecting surface (IRS) in the presence of a passive eavesdropper for Internet of Things (IoT), and proposes three IRS …
- 238000004891 communication 0 title abstract description 41
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
- H04B7/022—Site diversity; Macro-diversity
- H04B7/024—Co-operative use of antennas of several sites, e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0613—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
- H04B7/0615—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
- H04B7/0619—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal using feedback from receiving side
- H04B7/0621—Feedback content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
- H04B7/0456—Selection of precoding matrices or codebooks, e.g. using matrices antenna weighting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/24—Cell structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cao et al. | Improving physical layer security of uplink NOMA via energy harvesting jammers | |
Cao et al. | Physical-layer security for intelligent-reflecting-surface-aided wireless-powered communication systems | |
Cao et al. | Secure transmission designs for NOMA systems against internal and external eavesdropping | |
Wu et al. | A survey of physical layer security techniques for 5G wireless networks and challenges ahead | |
Yang et al. | Covert transmission and secrecy analysis of RS-RIS-NOMA-aided 6G wireless communication systems | |
Lei et al. | Secrecy outage analysis of mixed RF-FSO downlink SWIPT systems | |
Yue et al. | Secure communications in a unified non-orthogonal multiple access framework | |
Cumanan et al. | Physical layer security jamming: Theoretical limits and practical designs in wireless networks | |
Lei et al. | Secrecy outage performance of transmit antenna selection for MIMO underlay cognitive radio systems over Nakagami-$ m $ channels | |
Ding et al. | On the application of cooperative transmission to secrecy communications | |
Nguyen et al. | A new design paradigm for secure full-duplex multiuser systems | |
Zhu et al. | On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping | |
Lee et al. | Joint transceiver optimization for MISO SWIPT systems with time switching | |
Zhang et al. | Secure beamforming design for SWIPT in MISO broadcast channel with confidential messages and external eavesdroppers | |
Yang et al. | Algorithms for secrecy guarantee with null space beamforming in two-way relay networks | |
Sun et al. | Secure transmissions in wireless information and power transfer millimeter-wave ultra-dense networks | |
Nguyen et al. | Wireless energy harvesting assisted two-way cognitive relay networks: Protocol design and performance analysis | |
Peng et al. | RIS-aided D2D communications relying on statistical CSI with imperfect hardware | |
Yu et al. | Secrecy outage performance analysis for cooperative NOMA over Nakagami-$ m $ channel | |
Singh et al. | Physical layer security of a multiantenna-based CR network with single and multiple primary users | |
Li et al. | Physical layer security analysis of cognitive NOMA Internet of Things networks | |
Chang et al. | Secure and energy-efficient resource allocation for wireless power enabled full-/half-duplex multiple-antenna relay systems | |
Hu et al. | Security optimization for an AF MIMO two-way relay-assisted cognitive radio nonorthogonal multiple access networks with SWIPT | |
Zhao et al. | Exploiting trust degree for multiple-antenna user cooperation | |
Chen et al. | Energy-efficient secure multiuser scheduling in energy harvesting untrusted relay networks |