A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

Physical layer authentication and security design in the machine learning era

TM Hoang, A Vahid, HD Tuan… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Security at the physical layer (PHY) is a salient research topic in wireless systems, and
machine learning (ML) is emerging as a powerful tool for providing new data-driven security …

Physical layer security for wireless-powered ambient backscatter cooperative communication networks

X Li, J Jiang, H Wang, C Han, G Chen… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Low power consumption and high spectrum efficiency as the great challenges for multi-
device access to Internet-of-Things (IoT) have put forward stringent requirements on the …

Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city

D Wang, B Bai, K Lei, W Zhao, Y Yang, Z Han - IEEE Access, 2019 - ieeexplore.ieee.org
Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC)
are believed as supporting technologies for building a smart city. The advancement and …

Cooperative-jamming-aided secrecy enhancement in wireless networks with passive eavesdroppers

L Hu, H Wen, B Wu, J Tang, F Pan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper investigates cooperative security in wireless networks, where a source (Alice)
intends to transmit a confidential message to a legitimate destination (Bob), with the help of …

Secure V2V communications in relay-assisted cognitive radio vehicular networks with imperfect CSI

Y Zhang, J Hou, X Zhao - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
This article considers a relay-based underlay cognitive radio vehicular network, where a
secondary source vehicle transmits information to a secondary destination vehicle with a …

Secure beamforming for full-duplex MIMO two-way untrusted relay systems

S Zhao, J Liu, Y Shen, X Jiang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper focuses on a full-duplex multiple-input multiple-output two-way untrusted relay
system, and investigates the optimal beamforming design of such system to maximize its …

Cooperative secure communication in two-hop buffer-aided networks

D Wang, P Ren, J Cheng - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We propose two cooperative secure transmission schemes to protect a two-hop buffer-aided
network assisted by an energy harvesting relay. In the first scheme, we assume that the …

Secure transmission in SWIPT-powered two-way untrusted relay networks

J Zhang, X Tao, H Wu, X Zhang - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we investigate the secure transmission in two-way untrusted amplify-and-
forward relay networks with simultaneous wireless information and power transfer (SWIPT) …

Secure and energy-efficient precoding for MIMO two-way untrusted relay systems

S Zhao, J Liu, Y Shen, X Jiang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper focuses on the multiple-input-multiple-output (MIMO) two-way relay system with
an untrusted relay and investigates its secure and energy-efficient precoding design issue …