PROJECT TITLE :

Secure Communication design for multi-user peer-to-peer wireless relay networks

ABSTRACT:

During this study, physical layer security techniques are studied for multi-user peer-to-peer relay networks using amplify-and-forward protocol in the presence of an eavesdropper. Two system styles are thought of: the minimum achievable secrecy rate maximisation and the total transmit power minimisation. 1st, considering user fairness, the authors study the max–min achievable secrecy rate problem subject to a total transmit power constraint. Mathematically, the optimisation problem is non-linear and non-convex. They propose a polynomial time algorithm primarily based on the bisection technique to solve it. Second, they study the whole transmit power minimisation problem which aims at minimising the overall transmit power at relays such that individual secrecy rate for every user is satisfied. The whole power optimisation problem is additionally non-convex, therefore they use the comfort technique to transform it into a convex problem which will be efficiently solved by the gradient-based mostly algorithms. Numerical analysis of the obtained secrecy rate and transmit power results shows that the proposed designs will considerably improve the performance of secure wireless Communications.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE : Fast and Secure Distributed Nonnegative Matrix Factorization ABSTRACT: The nonnegative matrix factorization (NMF) technique has been utilized effectively in a number of different data mining activities. Because
PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : Secure Cloud Data Deduplication with Efficient Re-encryption ABSTRACT: The data deduplication technique has seen widespread adoption among commercial cloud storage providers, which is both important and necessary
PROJECT TITLE : Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus ABSTRACT: In the fields of cryptography and algorithmic number theory, modular inversion is regarded as one of the operations that
PROJECT TITLE : Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage ABSTRACT: Cloud storage has become a primary industry in remote data management services, but it also attracts security concerns.

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry