0000000000528865

AUTHOR

Trung Q. Duong

showing 3 related works from this author

IEEE Access Special Section Editorial: Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security

2018

Interference used to be viewed as a harmful factor in wireless networks, which can reduce the quality of information transmission. To combat against interference, many interference management techniques have emerged. Due to the latest research advances, interference (or noise) can also be exploited to offer some benefits to wireless networks. The first aspect is that interference in multi-user networks can be collected as a green power supply for the transceivers, known as wireless energy harvesting. Another application is that one can generate artificial noise to disrupt the adversarial eavesdropping, and guarantee the security of wireless networks. Therefore, conventional interference man…

wireless networksGeneral Computer ScienceComputer sciencenoise (radio technology)ComputerApplications_COMPUTERSINOTHERSYSTEMShäiriötInterference (communication)General Materials Sciencekohinakyberturvallisuusta213Wireless networkbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral EngineeringEavesdroppingTransmission (telecommunications)interferenceslcsh:Electrical engineering. Electronics. Nuclear engineeringTransceiverbusinessenergiantuotantolcsh:TK1-9971Energy harvestinglangattomat verkotComputer networkIEEE Access
researchProduct

Investigation of data encryption impact on broadcasting visible light communications

2014

Este trabajo investiga el impacto de la encriptación y desencriptación de datos en un sistema de comunicaciones de luz visible (VLC) de difusión en interiores incrustado en la capa física. Se ha implementado el cifrado RSA para proporcionar una transmisión de datos segura en la capa física. El artículo muestra el rendimiento de la tasa de error de bits (BER) para los sistemas VLC seguros y no seguros (8 y 12 bits) para velocidades de datos de 2 y 12 Mbps. Para una BER de 10e-4 mostramos que hay penalizaciones de potencia de 2-4 dB con las VLC seguras. También se investiga el impacto de la longitud de la clave en la propagación del error y la penalización de potencia. EU Cost Action IC1101 T…

VLCUNESCO::CIENCIAS TECNOLÓGICAS::Tecnología de las telecomunicacionesBERbusiness.industryComputer sciencedecryptionPhysical layerVisible light communicationpower penaltyEncryptionUNESCO::MATEMÁTICAS::Ciencia de los ordenadores::Código y sistemas de codificación:CIENCIAS TECNOLÓGICAS::Tecnología de las telecomunicaciones [UNESCO]Broadcasting (networking)RSABroadcast communication networkBit error rate:MATEMÁTICAS::Ciencia de los ordenadores::Código y sistemas de codificación [UNESCO]businessComputer hardwareencryptionKey sizeComputer networkData transmission
researchProduct

A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security

2019

Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and sch…

BeamformingComputer scienceJammingCryptography5G-tekniikka02 engineering and technologylangaton tiedonsiirto0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic Engineeringtietoturvabusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layer020206 networking & telecommunications020302 automobile design & engineeringEavesdropping5G communicationsphysical layer security (PLS)jamming techniquesrelaying protocolsKey (cryptography)business5Glangattomat verkotComputer network
researchProduct