On the security enhancement of uplink NOMA systems with jammer selection

K Cao, B Wang, H Ding, L Lv, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We investigate physical layer security of an uplink NOMA system consisting of one base
station, multiple users and one eavesdropper. During each uplink transmission, two users …

CRT-BIoV: a cognitive radio technique for blockchain-enabled internet of vehicles

G Rathee, F Ahmad, F Kurugollu… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Cognitive Radio Network (CRN) is considered as a viable solution on Internet of Vehicle
(IoV) where objects equipped with cognition make decisions intelligently through the …

Resource allocation and trajectory design in UAV-assisted jamming wideband cognitive radio networks

Y Wang, L Chen, Y Zhou, X Liu, F Zhou… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The secure performance of wideband cognitive radio networks (CRNs) with OFDMA
(orthogonal frequency-division multiple access) achieved by using physical layer security is …

Covert communications aided by cooperative jamming in overlay cognitive radio networks

Y Wen, L Liu, J Li, Y Li, K Wang, S Yu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper examines integrating jamming and secondary signals for covert communications
in cognitive radio networks (CRNs), aiming to enhance covertness by using jamming and …

Generative adversarial network assisted power allocation for cooperative cognitive covert communication system

X Liao, J Si, J Shi, Z Li, H Ding - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
This letter investigates a power allocation problem for a cooperative cognitive covert
communication system, where the relay secondary transmitter (ST) covertly transmits private …

Secure Uplink Transmission Against Multi-Intelligent Eavesdroppers With Time-Domain Artificial Noise in MIMO IoT Systems

Y Wu, Y Huo, Q Gao, J Mao, Z Yang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Physical-layer security (PLS) has become an intriguing technology to address
eavesdrop** issues in Internet of Things (IoT) systems owing to its low complexity and …

Cognitive NOMA for UAV-enabled secure communications: Joint 3D trajectory design and power allocation

N Tang, H Tang, B Li, X Yuan - IEEE Access, 2020 - ieeexplore.ieee.org
In the paper, we investigate the physical layer security (PLS) of an unmanned aerial vehicle
(UAV) enabled communication system that integrates non-orthogonal multiple access …

A secure spectrum handoff mechanism in cognitive radio networks

G Rathee, N Jaglan, S Garg, BJ Choi… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The need for more efficient spectrum utilization is becoming more pronounced in our
increasingly digitalized society. However, this also introduces a variety of new security …

Approximate data aggregation in sensor equipped IoT networks

J Li, M Siddula, X Cheng, W Cheng… - Tsinghua Science and …, 2019 - ieeexplore.ieee.org
As Internet-of-Things (IoT) networks provide efficient ways to transfer data, they are used
widely in data sensing applications. These applications can further include wireless sensor …

A cross-layer cooperative jamming scheme for social internet of things

Y Huo, J Fan, Y Wen, R Li - Tsinghua Science and Technology, 2021 - ieeexplore.ieee.org
In this paper, we design a friendly jammer selection scheme for the social Internet of Things
(IoT). A typical social IoT is composed of a cellular network with underlaying Device-to …