Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

Matching theory: Applications in wireless communications

S Bayat, Y Li, L Song, Z Han - IEEE Signal Processing …, 2016 - ieeexplore.ieee.org
Matching theory is a powerful tool to study the formation of dynamic and mutually beneficial
relations among different types of rational and selfish agents. It has been widely used to …

A survey of security issues in cognitive radio networks

J Li, Z Feng, Z Feng, P Zhang - China Communications, 2015 - ieeexplore.ieee.org
In the last decade, cognitive radio (CR) has emerged as a major next generation wireless
networking technology, which is the most promising candidate solution to solve the spectrum …

Improving secrecy rate via spectrum leasing for friendly jamming

I Stanojev, A Yener - IEEE Transactions on Wireless …, 2012 - ieeexplore.ieee.org
Cooperative jamming paradigm in secure communications enlists network nodes to transmit
noise or structured codewords, in order to impair the eavesdropper's ability to decode …

Securing large-scale d2d networks using covert communication and friendly jamming

S Feng, X Lu, S Sun, D Niyato… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We exploit both covert communication and friendly jamming to propose a friendly jamming-
assisted covert communication and use it to doubly secure a large-scale device-to-device …

Physical layer security for two way relay communications with friendly jammers

R Zhang, L Song, Z Han, B Jiao… - 2010 IEEE global …, 2010 - ieeexplore.ieee.org
In this paper, we consider a two-way relay network where two sources can communicate
only through an unauthenticated intermediate relay node. We investigate secure …

Physical-layer security in distributed wireless networks using matching theory

S Bayat, RHY Louie, Z Han… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
We consider the use of physical-layer security in a wireless communication system where
multiple jamming nodes assist multiple source-destination nodes in combating unwanted …

Safeguarding the ultra-dense networks with the aid of physical layer security: A review and a case study

Y Wang, Z Miao, L Jiao - IEEE Access, 2016 - ieeexplore.ieee.org
In the wake of the extensive application of the fourth generation system, investigations of
new technologies have been moving ahead vigorously to embrace the next generation …

Enhancing secrecy rate in cognitive radio networks via stackelberg game

A Al-Talabani, Y Deng, A Nallanathan… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, a game theory-based cooperation scheme is investigated to enhance the
physical layer security in both primary and secondary transmissions of a cognitive radio …

Secure M-PSK communication via directional modulation

A Kalantari, M Soltanalian, S Maleki… - … , Speech and Signal …, 2016 - ieeexplore.ieee.org
In this work, a directional modulation-based technique is devised to enhance the security of
a multi-antenna wireless communication system employing M-PSK modulation to convey …