A survey of optimization approaches for wireless physical layer security
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …
increasing concerns from both academia and industry. The research on physical layer …
Secure radar-communication systems with malicious targets: Integrating radar, communications and jamming functionalities
This article studies the physical layer security in a multiple-input-multiple-output (MIMO) dual-
functional radar-communication (DFRC) system, which communicates with downlink cellular …
functional radar-communication (DFRC) system, which communicates with downlink cellular …
Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers
In this paper, we study the secure multi-antenna transmission with artificial noise (AN) under
slow fading channels coexisting with randomly located eavesdroppers. We provide a …
slow fading channels coexisting with randomly located eavesdroppers. We provide a …
Secrecy transmit beamforming for heterogeneous networks
In this paper, we pioneer the study of physical-layer security in heterogeneous networks
(HetNets). We investigate secure communications in a two-tier downlink HetNet, which …
(HetNets). We investigate secure communications in a two-tier downlink HetNet, which …
Secure full duplex integrated sensing and communications
A Bazzi, M Chafii - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
The following paper models a secure full duplex (FD) integrated sensing and
communication (ISAC) scenario, where malicious eavesdroppers aim at intercepting the …
communication (ISAC) scenario, where malicious eavesdroppers aim at intercepting the …
A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security
MK Tefera, Z **, S Zhang - Sensors, 2022 - mdpi.com
With the proliferation of 5G mobile networks within next-generation wireless communication,
the design and optimization of 5G networks are progressing in the direction of improving the …
the design and optimization of 5G networks are progressing in the direction of improving the …
Broadcast secrecy rate maximization in UAV-empowered IRS backscatter communications
The backscatter communications (BackCom) and physical layer security are respected to
realize extremely low-power secure communications in the imminent sixth generation (6G) …
realize extremely low-power secure communications in the imminent sixth generation (6G) …
Sensing-assisted eavesdropper estimation: An ISAC breakthrough in physical layer security
In this paper, we investigate the sensing-aided physical layer security (PLS) towards
Integrated Sensing and Communication (ISAC) systems. A well-known limitation of PLS is …
Integrated Sensing and Communication (ISAC) systems. A well-known limitation of PLS is …
On the physical layer security analysis of hybrid millimeter wave networks
To cope up with the explosive growth of mobile data demand, the fifth-generation mobile
network intents to exploit the available spectrum in millimeter-wave (mmWave) band to …
network intents to exploit the available spectrum in millimeter-wave (mmWave) band to …
Joint beamforming and power allocation for secrecy in peer-to-peer relay networks
This paper investigates the physical-layer security of a multiuser peer-to-peer (MUP2P) relay
network for amplify-and-forward (AF) protocol, where a secure user and other unclassified …
network for amplify-and-forward (AF) protocol, where a secure user and other unclassified …