Ara
Toplam kayıt 16, listelenen: 11-16
Randomized beamforming with generalized selection transmission for security enhancement in MISO wiretap channels
(IEEE-Inst Electrical Electronics Engineers Inc, 2018)
Transmit beamforming (TBF) has been proposed as an effective approach to enhance the security performance of multiple-input single-output (MISO) wiretap channels. However, this secrecy enhancement comes at some expenses, ...
Joint phy/mac layer security design using arq with mrc and null-space independent papr-aware artificial noise in siso systems
(IEEE-Institute of Electrical and Electronics Engineers Inc, 2018)
Automatic-repeat-request (ARQ) as a MAC layer mechanism and artificial noise (AN) as a physical layer mechanism along with the help of maximal ratio combining (MRC), are jointly designed to achieve secrecy. Basically, a ...
OFDM with index modulation for asynchronous mMTC networks
(MDPI, 2018)
One of the critical missions for next-generation wireless communication systems is to fulfill the high demand for massive Machine-Type Communications (mMTC). In mMTC systems, a sporadic transmission is performed between ...
NOMA for multinumerology OFDM systems
(Wiley Hindawi, 2018)
Nonorthogonal multiple access (NOMA) is a promising technique which outperforms the traditional multiple access schemes in many aspects. It uses superposition coding (SC) to share the available resources among the users ...
Adaptive OFDM-IM for enhancing physical layer security and spectral efficiency of future wireless networks
(Hindawi Limited, 2018)
In this paper, we propose algorithms for enhancing physical layer security and spectral efficiency of Orthogonal Frequency Division Multiplexing (OFDM) with Index Modulation (IM) systems. Particularly, different activation ...
Secure spatial multiple access using directional modulation
(IEEE-Institute of Electrical and Electronics Engineers Inc, 2018)
In this paper, we introduce a secure multiple access scheme, which exploits the multipath structure of the channel to create a multi-user interference environment. The generated interference enables legitimate users to ...