A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

A survey on reconfigurable intelligent surface for physical layer security of next-generation wireless communications

R Kaur, B Bansal, S Majhi, S Jain… - IEEE open journal of …, 2024 - ieeexplore.ieee.org
Unprecedented growth in wireless data traffic, and ever-increasing demand for highly
secured, and low-latency wireless communication has motivated the research community to …

Improving physical layer secrecy using full-duplex jamming receivers

G Zheng, I Krikidis, J Li, AP Petropulu… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper studies secrecy rate optimization in a wireless network with a single-antenna
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …

Physical layer network security in the full-duplex relay system

G Chen, Y Gong, P **ao… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
This paper investigates the secrecy performance of full-duplex relay (FDR) networks. The
resulting analysis shows that FDR networks have better secrecy performance than half …

On securing underwater acoustic networks: A survey

S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …

Secrecy rate analysis of UAV-enabled mmWave networks using Matérn hardcore point processes

Y Zhu, G Zheng, M Fitch - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as
an effective solution to provide large coverage and dynamic capacity for both military and …

Physical layer security with its applications in 5G networks: A review

L Sun, Q Du - China communications, 2017 - ieeexplore.ieee.org
5G network is expected to support massive user connections and exponentially increasing
wireless services, which makes network security unprecedentedly important. Unlike …

Secure multiple amplify-and-forward relaying with cochannel interference

L Fan, X Lei, N Yang, TQ Duong… - IEEE Journal of …, 2016 - ieeexplore.ieee.org
We investigate the impact of cochannel interference on the security performance of multiple
amplify-and-forward (AF) relaying networks, where N intermediate AF relays assist the data …

Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations

Q Xu, P Ren, H Song, Q Du - IEEE Access, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) depicts a bright future, where any devices having sensorial and
computing capabilities can interact with each other. Among all existing technologies, the …