Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Towards secure 5G networks: A Survey

S Zhang, Y Wang, W Zhou - Computer Networks, 2019 - Elsevier
To support various new use cases from vertical industries besides enhanced mobile
broadband communication services, the 5G system aims to provide higher speed, lower …

A survey on green communication and security challenges in 5G wireless communication networks

P Gandotra, RK Jha - Journal of Network and Computer Applications, 2017 - Elsevier
The 5G wireless cellular networks are evolving, to meet the drastic subscriber demands in
near future. This is accompanied with a rise in the energy consumption in cellular networks …

Beamforming techniques for nonorthogonal multiple access in 5G cellular networks

F Alavi, K Cumanan, Z Ding… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we develop various beamforming techniques for downlink transmission for
multiple-input single-output nonorthogonal multiple access (NOMA) systems. First, a …

Realizing efficient security and privacy in IoT networks

JH Anajemba, Y Tang, C Iwendi, A Ohwoekevwo… - Sensors, 2020 - mdpi.com
In recent times, security and privacy at the physical (PHY) layer has been a major issue of
several communication technologies which comprise the internet of things (IoT) and mostly …

5G device-to-device communication security and multipath routing solutions

A Celik, J Tetzner, K Sinha, J Matta - Applied Network Science, 2019 - Springer
Through direct communication, device-to-device (D2D) technology can increase the overall
throughput, enhance the coverage, and reduce the power consumption of cellular …

Optimization-based access assignment scheme for physical-layer security in D2D communications underlaying a cellular network

L Wang, J Liu, M Chen, G Gui… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we consider physical-layer security for device-to-device (D2D)
communications underlaying cellular networks in which cellular users are under threat from …

Energy efficiency optimization for secure transmission in MISO cognitive radio network with energy harvesting

M Zhang, K Cumanan, J Thiyagalingam, W Wang… - IEEE …, 2019 - ieeexplore.ieee.org
In this paper, we investigate different secrecy energy efficiency (SEE) optimization problems
in a multiple-input single-output underlay cognitive radio (CR) network in the presence of an …

Outage constrained robust secrecy energy efficiency maximization for EH cognitive radio networks

L Ni, X Da, H Hu, M Zhang… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
In this letter, we investigate the outage-constrained robust secure design in a multiple-input
single-output (MISO) energy harvesting (EH) cognitive radio network (CRN), where the …