The security–reliability tradeoff of multiuser scheduling-aided energy harvesting cognitive radio networks

X Ding, Y Zou, G Zhang, X Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We study the physical-layer security of a cognitive radio system in the face of multiple
eavesdroppers (EDs), which is composed of a secondary base station (SBS), multiple …

Physical layer security in multi-tag ambient backscatter communications–jamming vs. cooperation

JY Han, MJ Kim, J Kim, SM Kim - 2020 IEEE Wireless …, 2020 - ieeexplore.ieee.org
In this paper, we study on two different strategies-jamming and cooperation–for improving
physical layer security in multi-tag ambient backscatter communications, which utilize …

Secure transmission in multiple access wiretap channel: Cooperative jamming without sharing CSI

H He, X Luo, J Weng, K Wei - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
This paper investigates the secure transmission in multiple access wiretap channels, where
multiple legitimate users transmit private information to an intended receiver in the presence …

Physical layer security improvement using artificial noise-aided tag scheduling in ambient backscatter communication systems

JY Han, J Kim, SM Kim - 2019 Eleventh International …, 2019 - ieeexplore.ieee.org
In this paper, we propose an artificial noise-aided tag scheduling (ANTS) scheme in order to
enhance physical layer security in ambient backscatter communications (ABCs), which …

Security enhancement of fix chaotic-DSSS in WSNs

A Tayebi, S Berber, A Swain - IEEE Communications Letters, 2018 - ieeexplore.ieee.org
The security of the physical layer promises to provide secrecy for wireless communication.
The chaotic direct sequence spread spectrum (chaotic-DSSS) is one of the distinguished …

Secure modulation based on constellation map** obfuscation in OFDM based TDD systems

I Bang, T Kim - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we propose a secure modulation technique based on constellation map**
obfuscation to harden computational complexity for security at the physical-layer. To …

Secrecy Energy‐Efficient UAV Communication via Trajectory Design and Power Control

A Li, H Han, C Yu - Wireless Communications and Mobile …, 2021 - Wiley Online Library
This paper investigates the problem of maximizing the secrecy energy efficiency (SEE) for
unmanned aerial vehicle‐(UAV‐) to‐ground wireless communication system, in which a …

Secrecy rate analysis of opportunistic user scheduling in uplink networks with potential eavesdroppers

I Bang, BC Jung - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate two user scheduling algorithms (optimal user and threshold-
based user scheduling algorithms) when we consider potential eavesdroppers in an uplink …

Artificial noise-aided user scheduling from the perspective of secrecy outage probability

I Bang, SM Kim, DK Sung - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
In this correspondence paper, we propose a secure user scheduling scheme, which selects
a user for data transmission and an extra user for artificial noise generation in a multiuser …

On the Secrecy Sum-Rate of Internet of Things Networks: Scheduling and Power Control

I Bang, SH Chae, BC Jung - Electronics, 2024 - mdpi.com
Physical-layer security (PLS) has attracted much attention in wireless communications and
has been considered one of the main candidates for enhancing wireless security in future …