LIVIVO - The Search Portal for Life Sciences

zur deutschen Oberfläche wechseln
Advanced search

Search results

Result 1 - 2 of total 2

Search options

  1. Article ; Online: Machine Learning

    Kehua Guo / Zhiyuan Tan / Entao Luo / Xiaokang Zhou

    Security and Communication Networks, Vol

    The Cyber-Security, Privacy, and Public Safety Opportunities and Challenges for Emerging Applications

    2021  Volume 2021

    Keywords Technology (General) ; T1-995 ; Science (General) ; Q1-390
    Language English
    Publishing date 2021-01-01T00:00:00Z
    Publisher Hindawi-Wiley
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  2. Article ; Online: Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things

    Kun Tang / Wenjuan Tang / Entao Luo / Zhiyuan Tan / Weizhi Meng / Lianyong Qi

    Security and Communication Networks, Vol

    2020  Volume 2020

    Abstract: In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these systems, a primary transmitter (PT) will transmit its sensitive medical information ...

    Abstract In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these systems, a primary transmitter (PT) will transmit its sensitive medical information to a primary receiver (PR) by a multi-antenna-based secondary transmitter (ST), where we consider that a potential eavesdropper may listen to the PT’s sensitive information. Meanwhile, the ST also transmits its own information concurrently by utilizing spectrum sharing. We aim to propose a novel scheme for jointly designing the optimal parameters, i.e., energy harvesting (EH) time ratio and secure beamforming vectors, for maximizing the primary secrecy transmission rate while guaranteeing secondary transmission requirement. For solving the nonconvex optimization problem, we transfer the problem into convex optimization form by adopting the semidefinite relaxation (SDR) method and Charnes–Cooper transformation technique. Then, the optimal secure beamforming vectors and energy harvesting duration can be obtained easily by utilizing the CVX tools. According to the simulation results of secrecy transmission rate, i.e., secrecy capacity, we can observe that the proposed protocol for the considered system model can effectively promote the primary secrecy transmission rate when compared with traditional zero-forcing (ZF) scheme, while ensuring the transmission rate of the secondary system.
    Keywords Technology (General) ; T1-995 ; Science (General) ; Q1-390
    Subject code 003
    Language English
    Publishing date 2020-01-01T00:00:00Z
    Publisher Hindawi-Wiley
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

To top