A survey of optimization approaches for wireless physical layer security
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …
increasing concerns from both academia and industry. The research on physical layer …
Cooperative jamming for physical layer security enhancement in Internet of Things
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the
same resource block to improve the spectral efficiency. Whereas due to the resource …
same resource block to improve the spectral efficiency. Whereas due to the resource …
A secure multiuser privacy technique for wireless IoT networks using stochastic privacy optimization
JH Anajemba, T Yue, C Iwendi… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
With the exponential increase of interconnected communicating devices which make up the
Internet of Things (IoT), securing the network transmission and the fifth generation (5G) …
Internet of Things (IoT), securing the network transmission and the fifth generation (5G) …
Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis
This paper studies the secrecy rate maximization problem of a secure wireless
communication system in the presence of multiple eavesdroppers. The security of the …
communication system in the presence of multiple eavesdroppers. The security of the …
Artificial-noise-aided secure transmission in wiretap channels with transmitter-side correlation
This paper, for the first time, examines the impact of transmitter-side correlation on the
artificial-noise (AN)-aided secure transmission, based on which a new power allocation …
artificial-noise (AN)-aided secure transmission, based on which a new power allocation …
Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition
We study the cooperative secure transmissions in (multiple-input signal-output) MISO
vehicular relay networks where the infrastructure node with multiple antennas sends two …
vehicular relay networks where the infrastructure node with multiple antennas sends two …
Cooperative secure communication in two-hop buffer-aided networks
We propose two cooperative secure transmission schemes to protect a two-hop buffer-aided
network assisted by an energy harvesting relay. In the first scheme, we assume that the …
network assisted by an energy harvesting relay. In the first scheme, we assume that the …