Principles of physical layer security in multiuser wireless networks: A survey
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …
multiuser wireless networks. The essential premise of physical layer security is to enable the …
Matching theory: Applications in wireless communications
Matching theory is a powerful tool to study the formation of dynamic and mutually beneficial
relations among different types of rational and selfish agents. It has been widely used to …
relations among different types of rational and selfish agents. It has been widely used to …
A survey of security issues in cognitive radio networks
J Li, Z Feng, Z Feng, P Zhang - China Communications, 2015 - ieeexplore.ieee.org
In the last decade, cognitive radio (CR) has emerged as a major next generation wireless
networking technology, which is the most promising candidate solution to solve the spectrum …
networking technology, which is the most promising candidate solution to solve the spectrum …
Improving secrecy rate via spectrum leasing for friendly jamming
I Stanojev, A Yener - IEEE Transactions on Wireless …, 2012 - ieeexplore.ieee.org
Cooperative jamming paradigm in secure communications enlists network nodes to transmit
noise or structured codewords, in order to impair the eavesdropper's ability to decode …
noise or structured codewords, in order to impair the eavesdropper's ability to decode …
Securing large-scale d2d networks using covert communication and friendly jamming
We exploit both covert communication and friendly jamming to propose a friendly jamming-
assisted covert communication and use it to doubly secure a large-scale device-to-device …
assisted covert communication and use it to doubly secure a large-scale device-to-device …
Physical layer security for two way relay communications with friendly jammers
In this paper, we consider a two-way relay network where two sources can communicate
only through an unauthenticated intermediate relay node. We investigate secure …
only through an unauthenticated intermediate relay node. We investigate secure …
Physical-layer security in distributed wireless networks using matching theory
We consider the use of physical-layer security in a wireless communication system where
multiple jamming nodes assist multiple source-destination nodes in combating unwanted …
multiple jamming nodes assist multiple source-destination nodes in combating unwanted …
Safeguarding the ultra-dense networks with the aid of physical layer security: A review and a case study
In the wake of the extensive application of the fourth generation system, investigations of
new technologies have been moving ahead vigorously to embrace the next generation …
new technologies have been moving ahead vigorously to embrace the next generation …
Enhancing secrecy rate in cognitive radio networks via stackelberg game
In this paper, a game theory-based cooperation scheme is investigated to enhance the
physical layer security in both primary and secondary transmissions of a cognitive radio …
physical layer security in both primary and secondary transmissions of a cognitive radio …
Secure M-PSK communication via directional modulation
In this work, a directional modulation-based technique is devised to enhance the security of
a multi-antenna wireless communication system employing M-PSK modulation to convey …
a multi-antenna wireless communication system employing M-PSK modulation to convey …