Adaptive Strategies in Enhancing Physical Layer Security: A Comprehensive Survey

Z Duan, Z Chang, N **e, W Sun, D Niyato - ACM Computing Surveys, 2025‏ - dl.acm.org
Adaptive schemes in physical layer security, designed to dynamically respond to the
evolving conditions of wireless channels, play a crucial role in fortifying the security of …

When the warden does not know transmit power: Detection performance analysis and covertness strategy design

R He, G Li, J Chen, H Wang, R Ma… - IEEE Transactions …, 2024‏ - ieeexplore.ieee.org
In this paper, we consider a novel covert communication scenario where the warden does
not have prior knowledge of the transmitter's power. In this scenario, the current widely …

Channel-aware jammer selection and power control in covert communication

R He, J Chen, G Li, H Wang, Y Xu… - IEEE Transactions …, 2023‏ - ieeexplore.ieee.org
This paper considers a multi-jammer-assisted covert communication scenario, where a
transmitter communicates with a receiver without being detected by a warden under the …

Scheduling approaches for joint optimization of age and delay in industrial wireless networks

X **e, S Gao, H Wang - IEEE Transactions on Industrial …, 2024‏ - ieeexplore.ieee.org
In industrial wireless networks (IWNs), age of information (AoI) and delay are two significant
metrics to measure data freshness and delivery timeliness. In this article, an IWN system with …

Joint Covert and Secure Communication for SWIPT Assisted CNOMA Systems

G Huang, Y Lei, X Li, WU Khan, G Wang… - IEEE Internet of …, 2025‏ - ieeexplore.ieee.org
With the rapid advancement of physical-layer security technology, the covert and secure
communication has become crucial in safeguarding wireless communication systems. In this …

Energy Harvesting Jammer-Aided Covert Communications in Wireless Multi-Relay IoT Systems

H Lv, B Yang, X Sun, C Gao, B Gui… - IEEE Internet of Things …, 2025‏ - ieeexplore.ieee.org
This paper investigates covert communications in a multi-relay Internet of Things (IoT)
system with multiple energy harvesting jammers, where a transmitter (Alice) attempts to …

[HTML][HTML] Joint jammer selection and power optimization in covert communications against a warden with uncertain locations

Z Han, Y Zhou, Y Zhang, TX Zheng, L Liu… - Digital Communications …, 2024‏ - Elsevier
In covert communications, joint jammer selection and power optimization are important to
improve performance. However, existing schemes usually assume a warden with a known …

Joint Power and Beamformer Optimization in Multi-Antenna Relay Covert System: Exploiting Public Users as Shelter

R He, G Li, J Chen, H Wang, X Guan… - IEEE Transactions …, 2024‏ - ieeexplore.ieee.org
The environmental shelters such as public links can enable covert communication by
covering covert transmission. To further exploit shelters, this paper focuses on a two-hop …

Greedy Degree and Jamming Aided Covert Uplink Transmission in Cell-Free IoT Networks

R Chen, Z Chen, S Xu, K Ma, X Liu… - IEEE Internet of Things …, 2024‏ - ieeexplore.ieee.org
The cell-free (CF) network architecture has promising applications in Internet of Things (IoT)
networks due to its dynamic and adaptive nature in resource allocation. However, due to the …

[HTML][HTML] On IRS-Assisted Covert Communication with a Friendly UAV

X Xu, L Hu, S Wei, Y Qian, S Yan, F Shu, J Li - Drones, 2023‏ - mdpi.com
Driven by the rapidly growing demand for information security, covert wireless
communication has become an essential technology and attracted tremendous attention …