Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Secure transmission for IoT wireless energy-carrying communication systems
by
Jing, Zhen
, Li, Congcong
, Wang, Pingxin
, Zhu, Hongxia
, Wang, Qing
, Zhang, Zhi
in
Algorithms
/ Alternative energy
/ Beamforming
/ Communications equipment
/ Communications systems
/ Covariance matrix
/ Cybersecurity
/ Data loss
/ Digital imaging
/ Eavesdropping
/ Ecology and Environmental Sciences
/ Energy
/ Energy consumption
/ Engineering and Technology
/ Entropy
/ Image processing
/ Internet of Things
/ Internet of Things - instrumentation
/ Lower bounds
/ Management
/ Mathematical analysis
/ Messages
/ Natural resources
/ Physical Sciences
/ Social responsibility
/ Social Sciences
/ Wireless communications
/ Wireless Technology
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Secure transmission for IoT wireless energy-carrying communication systems
by
Jing, Zhen
, Li, Congcong
, Wang, Pingxin
, Zhu, Hongxia
, Wang, Qing
, Zhang, Zhi
in
Algorithms
/ Alternative energy
/ Beamforming
/ Communications equipment
/ Communications systems
/ Covariance matrix
/ Cybersecurity
/ Data loss
/ Digital imaging
/ Eavesdropping
/ Ecology and Environmental Sciences
/ Energy
/ Energy consumption
/ Engineering and Technology
/ Entropy
/ Image processing
/ Internet of Things
/ Internet of Things - instrumentation
/ Lower bounds
/ Management
/ Mathematical analysis
/ Messages
/ Natural resources
/ Physical Sciences
/ Social responsibility
/ Social Sciences
/ Wireless communications
/ Wireless Technology
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Secure transmission for IoT wireless energy-carrying communication systems
by
Jing, Zhen
, Li, Congcong
, Wang, Pingxin
, Zhu, Hongxia
, Wang, Qing
, Zhang, Zhi
in
Algorithms
/ Alternative energy
/ Beamforming
/ Communications equipment
/ Communications systems
/ Covariance matrix
/ Cybersecurity
/ Data loss
/ Digital imaging
/ Eavesdropping
/ Ecology and Environmental Sciences
/ Energy
/ Energy consumption
/ Engineering and Technology
/ Entropy
/ Image processing
/ Internet of Things
/ Internet of Things - instrumentation
/ Lower bounds
/ Management
/ Mathematical analysis
/ Messages
/ Natural resources
/ Physical Sciences
/ Social responsibility
/ Social Sciences
/ Wireless communications
/ Wireless Technology
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Secure transmission for IoT wireless energy-carrying communication systems
Journal Article
Secure transmission for IoT wireless energy-carrying communication systems
2023
Request Book From Autostore
and Choose the Collection Method
Overview
The wireless energy-carrying communication method for the Internet of Things (IoT) presents several difficulties for information security such as eavesdropping or data loss. To solve these issues, this paper presents a new secure transmission method for IoT wireless energy-carrying communication systems. In this method, first the secret message is turned into a word, delivered to the intended recipient and unlawful listener, respectively, and the received message is characterized as an entropy function. The message is iteratively solved using the block coordinate descent technique, and for each iteration, a digital baseband signal containing the receiver’s secret message symbol and the matching beamforming vector is delivered. By concurrently optimizing the transmit beamforming vector, the noise covariance matrix, and the receiver power allocation factor based on a design that complies with the security rate and energy acquisition limitations for each receiver, the overall system transmit power is reduced. The Lagrangian method is used to solve the secure transmission problem of the communication system based on an iterative block coordinate descent algorithm, as well as to change the nonconvex problem into a convex problem and precisely derive the upper and lower bounds of the original transmission problem. In comparison to the conventional policy transmission scheme, the experimental results demonstrate that the DIPS (Digital Image Processing System) scheme can increase the STP (Signaling Transfer Point) by approximately 34.16 percent in the eavesdropper independent eavesdropping and joint eavesdropping scenarios. The usefulness of the secure transmission strategy for wireless energy-carrying communication systems is confirmed by this investigation.
Publisher
Public Library of Science,Public Library of Science (PLoS)
This website uses cookies to ensure you get the best experience on our website.