A survey on multiple-antenna techniques for physical layer security
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …
widely recognized as a promising way to enhance wireless security by exploiting the …
A comprehensive survey on the cyber-security of smart grids: Cyber-attacks, detection, countermeasure techniques, and future directions
One of the significant challenges that smart grid networks face is cyber-security. Several
studies have been conducted to highlight those security challenges. However, the majority …
studies have been conducted to highlight those security challenges. However, the majority …
Security and privacy issues of UAV: A survey
The rapid development of the Unmanned Aerial Vehicle (UAV) brings much convenience to
our life. However, security and privacy problems caused by UAVs are gradually exposed …
our life. However, security and privacy problems caused by UAVs are gradually exposed …
Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model
In this paper, we investigate secure device-to-device (D2D) communication in energy
harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter …
harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter …
Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer
In this paper, we study resource allocation for multiuser multiple-input-single-output
secondary communication systems with multiple system design objectives. We consider …
secondary communication systems with multiple system design objectives. We consider …
Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- Channels
This paper considers a multiple-input-multiple-output (MIMO) cognitive wiretap system over
Nakagami-m channels with generalized selection combining (GSC), where confidential …
Nakagami-m channels with generalized selection combining (GSC), where confidential …
On the design and implementation of a secure blockchain-based hybrid framework for Industrial Internet-of-Things
Abstract Industrial Internet-of-Things (IIoT) refers to the next stage in the evolution of
organizations where collecting, analyzing, recording the data and controlling the entire …
organizations where collecting, analyzing, recording the data and controlling the entire …
Secure outage analysis of RIS-assisted communications with discrete phase control
This correspondence investigates a reconfigurable intelligent surface (RIS)-assisted
wireless communication system with security threats. The RIS is deployed to enhance the …
wireless communication system with security threats. The RIS is deployed to enhance the …
Secrecy Performance Analysis of Cognitive Decode-and-Forward Relay Networks in Nakagami- Fading Channels
This paper investigates the physical layer security problem of cognitive decode-and-forward
relay networks over Nakagami-m fading channels. We consider the relaying communication …
relay networks over Nakagami-m fading channels. We consider the relaying communication …
Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey
Cyber-security threats and issues have been exponentially increasing over the last two
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …