Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

A comprehensive survey on full-duplex communication: Current solutions, future trends, and open issues

M Mohammadi, Z Mobini… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Full-duplex (FD) communication is a potential game changer for future wireless networks. It
allows for simultaneous transmit and receive operations over the same frequency band, a …

User-centric view of unmanned aerial vehicle transmission against smart attacks

L ** via cognitive jamming in fading channels
J Xu, L Duan, R Zhang - IEEE transactions on wireless …, 2017 - ieeexplore.ieee.org
To enhance the national security, there is a growing need for authorized parties to
legitimately monitor suspicious communication links for preventing intended crimes and …

Wireless information surveillance via proactive eavesdrop** with spoofing relay

Y Zeng, R Zhang - IEEE Journal of Selected Topics in Signal …, 2016 - ieeexplore.ieee.org
Wireless information surveillance, by which suspicious wireless communications are closely
monitored by legitimate agencies, is an integral part of national security. To enhance the …

Surveillance and intervention of infrastructure-free mobile communications: A new wireless security paradigm

J Xu, L Duan, R Zhang - IEEE Wireless Communications, 2017 - ieeexplore.ieee.org
Conventional wireless security assumes wireless communications are legitimate, and aims
to protect them against malicious eavesdrop** and jamming attacks. However, emerging …

Energy efficient legitimate wireless surveillance of UAV communications

K Li, RC Voicu, SS Kanhere, W Ni… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) enhance connectivity and accessibility for civilian and
military applications. Criminals or terrorists can potentially use UAVs for committing crimes …

Multi-antenna wireless legitimate surveillance systems: Design and performance analysis

C Zhong, X Jiang, F Qu, Z Zhang - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
To improve national security, government agencies have long been committed to enforcing
powerful surveillance measures on suspicious individuals or communications. In this paper …