Secure Transmission Rate of Short Packets with Queueing Delay Requirement

Author(s):  
Chunhui Li ◽  
Changyang She ◽  
Nan Yang ◽  
Tony Q. S. Quek
2015 ◽  
Vol 2015 ◽  
pp. 1-14
Author(s):  
Dawei Wang ◽  
Pinyi Ren ◽  
Qinghe Du ◽  
Li Sun ◽  
Yichen Wang

Aiming at allocating more licensed spectrum to wireless sensor nodes (SNs) under the constraint of the information security requirement of the primary system, in this paper, we propose a cooperative relaying and jamming secure transmission (CRJS) scheme in which SNs will relay primary message and jam primary eavesdrop concurrently with SN’s downlink and uplink information transmission in cognitive radio sensor networks (CRSNs). In our proposed CRJS scheme, SNs take advantages of physical layer secure technologies to protect the primary transmission and acquire some interference-free licensed spectrum as a reward. In addition, both decode-and-forward (DF) and amplify-and-forward (AF) relaying protocols are investigated in our proposed CRJS scheme. Our object is to maximize the transmission rate of SNs by optimal allocating of the relaying power, jamming power, and downlink and uplink transmit power under the target secure transmission rate requirement of the primary system. Moreover, two suboptimal algorithms are proposed to deal with these optimization problems. Furthermore, we analyze the transmission rate of SNs and allocate the relaying power, jamming power, and downlink and uplink transmit power for the asymptotic scenarios. Simulation results demonstrate the performance superiority of our developed strategy over conventional jamming scheme in terms of the transmission rate of WSN.


2021 ◽  
Vol 13 (21) ◽  
pp. 4286
Author(s):  
Dawei Wang ◽  
Yang Zhao ◽  
Yixin He ◽  
Xiao Tang ◽  
Lixin Li ◽  
...  

Unmanned aerial vehicle (UAV) and reconfigurable intelligent surface (RIS) methods are promising techniques for improving the energy and spectrum efficiency of Fifth Generation/Beyond Fifth Generation (5G/B5G) networks. In order to take advantage of both techniques, we propose an RIS-assisted UAV secure communication scheme, where an UAV is equipped with RIS to facilitate secure transmission. To maximize the average secrecy rate, we jointly optimize the beamforming power, reflect phase shift, and UAV’s trajectory. For this non-convex problem, we decompose it into the power beamforming problem, the phase shift optimization problem, and the UAV’s trajectory design problem, and proposed an efficient iterative algorithm to solve the problem. The numerical results verify the superiority of the proposed scheme that can improve the average secure transmission rate by about 20% compared to that of Eavesdropping elimination methods.


Author(s):  
P. Hagemann

The use of computers in the analytical electron microscopy today shows three different trends (1) automated image analysis with dedicated computer systems, (2) instrument control by microprocessors and (3) data acquisition and processing e.g. X-ray or EEL Spectroscopy.While image analysis in the T.E.M. usually needs a television chain to get a sequential transmission suitable as computer input, the STEM system already has this necessary facility. For the EM400T-STEM system therefore an interface was developed, that allows external control of the beam deflection in TEM as well as the control of the STEM probe and video signal/beam brightness on the STEM screen.The interface sends and receives analogue signals so that the transmission rate is determined by the convertors in the actual computer periphery.


Sign in / Sign up

Export Citation Format

Share Document