In this work, we investigate the performance analysis of a device-to-device (D2D) communication network under an eavesdropper E attack. Besides, we assume that E is located in the proximal region where it can overhear the information from the source S. Specifically, S transmits information to the destination D, adopting the power beacon's energy to surmount the limited energy budget. Moreover, to reduce the quality of the eavesdropping link, the cooperative jamming technique can be used, where the multi-friendly jammers are employed to generate the artificial noises to E continuously. As considering the above presentation, we derive the quality of system analysis in terms of the outage probability (OP), intercept probability (IP), and secre...
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large...
This paper studies the secrecy performance of an energy-harvesting relaying system in the presence o...
Information security and self-sustainability are crucial to resource-limited wireless networks. In t...
In this work, we investigate the per- formance analysis of a device-to-device (D2D) communication ...
In this paper, the impact of the jamming signal on the secrecy performance of Energy Harvesting (EH)...
This work investigates the secrecy capability of energy harvesting based overlay cognitive networks ...
In this paper, we study radio frequency energy harvesting (EH) in a wireless sensor network in the p...
Radiofrequency (RF) signals can provide both information and energy, which have excellent advantages...
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication ...
—Physical layer security (PLS) and simultane ous wireless information and power transfer (SWIPT) in ...
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in th...
This paper analyzes the secrecy performance of a reconfigurable intelligent surface (RIS) assisted w...
In this paper, the impact of the jamming signal on the secrecy performance of Energy Harvesting (EH)...
We investigate the secrecy performance and energy-efficiency trade-offs associated to the secure com...
Radio-frequency (RF) energy harvesting (EH) in wireless relaying networks has attracted considerable...
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large...
This paper studies the secrecy performance of an energy-harvesting relaying system in the presence o...
Information security and self-sustainability are crucial to resource-limited wireless networks. In t...
In this work, we investigate the per- formance analysis of a device-to-device (D2D) communication ...
In this paper, the impact of the jamming signal on the secrecy performance of Energy Harvesting (EH)...
This work investigates the secrecy capability of energy harvesting based overlay cognitive networks ...
In this paper, we study radio frequency energy harvesting (EH) in a wireless sensor network in the p...
Radiofrequency (RF) signals can provide both information and energy, which have excellent advantages...
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication ...
—Physical layer security (PLS) and simultane ous wireless information and power transfer (SWIPT) in ...
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in th...
This paper analyzes the secrecy performance of a reconfigurable intelligent surface (RIS) assisted w...
In this paper, the impact of the jamming signal on the secrecy performance of Energy Harvesting (EH)...
We investigate the secrecy performance and energy-efficiency trade-offs associated to the secure com...
Radio-frequency (RF) energy harvesting (EH) in wireless relaying networks has attracted considerable...
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large...
This paper studies the secrecy performance of an energy-harvesting relaying system in the presence o...
Information security and self-sustainability are crucial to resource-limited wireless networks. In t...