The security–reliability tradeoff of multiuser scheduling-aided energy harvesting cognitive radio networks
X Ding, Y Zou, G Zhang, X Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We study the physical-layer security of a cognitive radio system in the face of multiple
eavesdroppers (EDs), which is composed of a secondary base station (SBS), multiple …
eavesdroppers (EDs), which is composed of a secondary base station (SBS), multiple …
Physical layer security in multi-tag ambient backscatter communications–jamming vs. cooperation
JY Han, MJ Kim, J Kim, SM Kim - 2020 IEEE Wireless …, 2020 - ieeexplore.ieee.org
In this paper, we study on two different strategies-jamming and cooperation–for improving
physical layer security in multi-tag ambient backscatter communications, which utilize …
physical layer security in multi-tag ambient backscatter communications, which utilize …
Secure transmission in multiple access wiretap channel: Cooperative jamming without sharing CSI
This paper investigates the secure transmission in multiple access wiretap channels, where
multiple legitimate users transmit private information to an intended receiver in the presence …
multiple legitimate users transmit private information to an intended receiver in the presence …
Physical layer security improvement using artificial noise-aided tag scheduling in ambient backscatter communication systems
JY Han, J Kim, SM Kim - 2019 Eleventh International …, 2019 - ieeexplore.ieee.org
In this paper, we propose an artificial noise-aided tag scheduling (ANTS) scheme in order to
enhance physical layer security in ambient backscatter communications (ABCs), which …
enhance physical layer security in ambient backscatter communications (ABCs), which …
Security enhancement of fix chaotic-DSSS in WSNs
The security of the physical layer promises to provide secrecy for wireless communication.
The chaotic direct sequence spread spectrum (chaotic-DSSS) is one of the distinguished …
The chaotic direct sequence spread spectrum (chaotic-DSSS) is one of the distinguished …
Secure modulation based on constellation map** obfuscation in OFDM based TDD systems
In this paper, we propose a secure modulation technique based on constellation map**
obfuscation to harden computational complexity for security at the physical-layer. To …
obfuscation to harden computational complexity for security at the physical-layer. To …
Secrecy Energy‐Efficient UAV Communication via Trajectory Design and Power Control
A Li, H Han, C Yu - Wireless Communications and Mobile …, 2021 - Wiley Online Library
This paper investigates the problem of maximizing the secrecy energy efficiency (SEE) for
unmanned aerial vehicle‐(UAV‐) to‐ground wireless communication system, in which a …
unmanned aerial vehicle‐(UAV‐) to‐ground wireless communication system, in which a …
Secrecy rate analysis of opportunistic user scheduling in uplink networks with potential eavesdroppers
In this paper, we investigate two user scheduling algorithms (optimal user and threshold-
based user scheduling algorithms) when we consider potential eavesdroppers in an uplink …
based user scheduling algorithms) when we consider potential eavesdroppers in an uplink …
Artificial noise-aided user scheduling from the perspective of secrecy outage probability
In this correspondence paper, we propose a secure user scheduling scheme, which selects
a user for data transmission and an extra user for artificial noise generation in a multiuser …
a user for data transmission and an extra user for artificial noise generation in a multiuser …
On the Secrecy Sum-Rate of Internet of Things Networks: Scheduling and Power Control
Physical-layer security (PLS) has attracted much attention in wireless communications and
has been considered one of the main candidates for enhancing wireless security in future …
has been considered one of the main candidates for enhancing wireless security in future …