Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

Advances in cognitive radio networks: A survey

B Wang, KJR Liu - IEEE Journal of selected topics in signal …, 2010 - ieeexplore.ieee.org
With the rapid deployment of new wireless devices and applications, the last decade has
witnessed a growing demand for wireless radio spectrum. However, the fixed spectrum …

Well-architected wireless network security

AA Mughal - Journal of Humanities and Applied Science …, 2022 - journals.sagescience.org
In this comprehensive research article, we explore the critical aspects of well-architected
wireless network security. We examine the fundamental principles of wireless security …

Artificial Intelligence in Information Security: Exploring the Advantages, Challenges, and Future Directions

AA Mughal - Journal of Artificial Intelligence and Machine …, 2018 - journals.sagescience.org
This research explores the use of artificial intelligence (AI) in information security,
highlighting the advantages and challenges associated with this approach. The paper …

A survey on security threats and detection techniques in cognitive radio networks

AG Fragkiadakis, EZ Tragos… - … Surveys & Tutorials, 2012 - ieeexplore.ieee.org
With the rapid proliferation of new technologies and services in the wireless domain,
spectrum scarcity has become a major concern. The allocation of the Industrial, Medical and …

Byzantine attack and defense in cognitive radio networks: A survey

L Zhang, G Ding, Q Wu, Y Zou, Z Han… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …

Physical layer authentication in wireless communication networks: A survey

L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
Physical layer security (PLS) in wireless communication systems has attracted extensive
research attentions in recent years. Unlike cryptography-based methods applied in upper …

Generative adversarial network in the air: Deep adversarial learning for wireless signal spoofing

Y Shi, K Davaslioglu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The spoofing attack is critical to bypass physical-layer signal authentication. This paper
presents a deep learning-based spoofing attack to generate synthetic wireless signals that …

A survey of security challenges in cognitive radio networks: Solutions and future research directions

A Attar, H Tang, AV Vasilakos, FR Yu… - Proceedings of the …, 2012 - ieeexplore.ieee.org
In this survey, we present a comprehensive list of major known security threats within a
cognitive radio network (CRN) framework. We classify attack techniques based on the type …

An anti-jamming stochastic game for cognitive radio networks

B Wang, Y Wu, KJR Liu… - IEEE journal on selected …, 2011 - ieeexplore.ieee.org
Various spectrum management schemes have been proposed in recent years to improve
the spectrum utilization in cognitive radio networks. However, few of them have considered …