New trends in stochastic geometry for wireless networks: A tutorial and survey
Next-generation wireless networks are expected to be highly heterogeneous, multilayered,
with embedded intelligence at both the core and edge of the network. In such a context …
with embedded intelligence at both the core and edge of the network. In such a context …
Achieving covertness and security in broadcast channels with finite blocklength
Considering multi-user downlink ultra-high reliability and low latency communications
(URLLC), this paper employs the artificial noise (AN) technique to establish a secure and …
(URLLC), this paper employs the artificial noise (AN) technique to establish a secure and …
Mean-field artificial noise assistance and uplink power control in covert IoT systems
In this paper, we study a covert Internet of Things (IoT) system. Compared with conventional
IoT systems that apply cryptography and information-theoretic secrecy approaches to secure …
IoT systems that apply cryptography and information-theoretic secrecy approaches to secure …
On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers
In this paper, a learning-aided content-based image transmission scheme is proposed,
where a multi-antenna source wishes to securely deliver an image to a legitimate …
where a multi-antenna source wishes to securely deliver an image to a legitimate …
Physical layer security in multi-antenna cellular systems: Joint optimization of feedback rate and power allocation
This paper comprehensively studies the physical layer security in frequency division duplex
multi-antenna cellular systems, where the multi-antenna base stations (BSs), legitimate …
multi-antenna cellular systems, where the multi-antenna base stations (BSs), legitimate …
Pilot spoofing attack by multiple eavesdroppers
In this paper, we investigate the design of a pilot spoofing attack (PSA) carried out by
multiple single-antenna eavesdroppers (Eves) in a downlink time-division duplex system …
multiple single-antenna eavesdroppers (Eves) in a downlink time-division duplex system …
Secrecy performance evaluation of scalable cell-free massive MIMO systems: A stochastic geometry approach
This paper presents the first performance analysis of physical layer downlink secure
transmissions in a scalable cell-free massive MIMO (SCF-mMIMO) system. A stochastic …
transmissions in a scalable cell-free massive MIMO (SCF-mMIMO) system. A stochastic …
Physical layer security in D2D underlay cellular networks with poisson cluster process
Device-to-device (D2D) communication is a promising solution to meet rapidly growing
demands for data services via spectrum reuse. This paper studies the physical layer security …
demands for data services via spectrum reuse. This paper studies the physical layer security …
On the impact of adaptive eavesdroppers in multi-antenna cellular networks
In this paper, the impact of adaptive smarter eavesdroppers on the secrecy performance of a
multi-antenna cellular network is investigated. The eavesdroppers can act as either passive …
multi-antenna cellular network is investigated. The eavesdroppers can act as either passive …
Artificial-noise-aided beamforming design in the MISOME wiretap channel under the secrecy outage probability constraint
This paper studies the artificial noise (AN) aided beamforming design in the multiple-input,
single-output, and multiple-eavesdropper wiretap channel from the perspective of secrecy …
single-output, and multiple-eavesdropper wiretap channel from the perspective of secrecy …