Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
A comprehensive survey on full-duplex communication: Current solutions, future trends, and open issues
Full-duplex (FD) communication is a potential game changer for future wireless networks. It
allows for simultaneous transmit and receive operations over the same frequency band, a …
allows for simultaneous transmit and receive operations over the same frequency band, a …
User-centric view of unmanned aerial vehicle transmission against smart attacks
L ** via cognitive jamming in fading channels
To enhance the national security, there is a growing need for authorized parties to
legitimately monitor suspicious communication links for preventing intended crimes and …
legitimately monitor suspicious communication links for preventing intended crimes and …
Wireless information surveillance via proactive eavesdrop** with spoofing relay
Wireless information surveillance, by which suspicious wireless communications are closely
monitored by legitimate agencies, is an integral part of national security. To enhance the …
monitored by legitimate agencies, is an integral part of national security. To enhance the …
Surveillance and intervention of infrastructure-free mobile communications: A new wireless security paradigm
Conventional wireless security assumes wireless communications are legitimate, and aims
to protect them against malicious eavesdrop** and jamming attacks. However, emerging …
to protect them against malicious eavesdrop** and jamming attacks. However, emerging …
Energy efficient legitimate wireless surveillance of UAV communications
Unmanned aerial vehicles (UAVs) enhance connectivity and accessibility for civilian and
military applications. Criminals or terrorists can potentially use UAVs for committing crimes …
military applications. Criminals or terrorists can potentially use UAVs for committing crimes …
Multi-antenna wireless legitimate surveillance systems: Design and performance analysis
To improve national security, government agencies have long been committed to enforcing
powerful surveillance measures on suspicious individuals or communications. In this paper …
powerful surveillance measures on suspicious individuals or communications. In this paper …