A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

Robust secure beamforming for intelligent reflecting surface assisted full-duplex MISO systems

Y Ge, J Fan - IEEE Transactions on Information Forensics and …, 2021 - ieeexplore.ieee.org
This paper investigates a full-duplex (FD) secure communication system with the assistance
of an intelligent reflecting surface (IRS). Compared with the traditional FD system, the IRS …

Physical-layer security with full-duplex transceivers and multiuser receiver at eve

NH Mahmood, IS Ansari, P Popovski… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Full-duplex communication enables simultaneous transmission from both ends of a
communication link, thereby promising significant performance gains. Generally, it has been …

Secure full-duplex small-cell networks in a spectrum sharing environment

NP Nguyen, C Kundu, HQ Ngo, TQ Duong… - IEEE …, 2016 - ieeexplore.ieee.org
In this paper, we propose three relay selection schemes for full-duplex heterogeneous
networks in the presence of multiple cognitive radio eavesdroppers. In this setup, the …

Full-duplex secure communications in cellular networks with downlink wireless power transfer

DH Chen, YC He - IEEE Transactions on Communications, 2017 - ieeexplore.ieee.org
This paper investigates full-duplex (FD) secure transmissions with simultaneous wireless
information and power transfer (SWIPT) on downlink (DL), where an FD base station, with …

Full-duplex or half-duplex? Hybrid relay selection for physical layer secrecy

H He, P Ren, Q Du, L Sun - 2016 IEEE 83rd Vehicular …, 2016 - ieeexplore.ieee.org
This paper studies the secrecy outage probability of hybrid relay selection scheme which
switches between full-duplex and half-duplex mode. First, motivated by the fact that either …

Enhanced transmit antenna selection scheme for secure throughput maximization without CSI at the transmitter

H Alves, MDC Tomé, PHJ Nardelli, CHM De Lima… - IEEE …, 2016 - ieeexplore.ieee.org
This paper addresses the establishment of secure communication links between Alice and
Bob in the presence of an eavesdropper (Eve). The proposed scenario assumes: 1) …

Physical layer security for full duplex relay system

T Wang, H Yang, Q Li - 2023 IEEE International Symposium on …, 2023 - ieeexplore.ieee.org
As an emerging technology for simultaneous co-frequency transmission, full-duplex
technology can theoretically multiply the spectral efficiency, and with the improvement of self …

Secure Rate Control and Statistical QoS Provisioning for Cloud‐Based IoT Networks

I Muhammad, H Alves, OA López… - Security and …, 2021 - Wiley Online Library
The Internet of Things (IoT) facilitates physical things to detect, interact, and execute
activities on‐demand, enabling a variety of applications such as smart homes and smart …

Throughput maximization in multi-hop wireless networks under a secrecy constraint

PHJ Nardelli, H Alves, CHM De Lima, M Latva-Aho - Computer Networks, 2016 - Elsevier
This paper analyzes the achievable throughput of multi-hop sensor networks for industrial
applications under a secrecy constraint and malicious jamming. The evaluation scenario …