A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

Improving physical layer security of uplink NOMA via energy harvesting jammers

K Cao, B Wang, H Ding, L Lv, R Dong… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
We investigate the secrecy transmission of uplink non-orthogonal multiple access (NOMA)
with the aid of energy harvesting (EH) jammers. During each time frame, communication is …

Energy-efficient computation offloading for secure UAV-edge-computing systems

T Bai, J Wang, Y Ren, L Hanzo - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Characterized by their ease of deployment and bird's-eye view, unmanned aerial vehicles
(UAVs) may be widely deployed both in surveillance and traffic management. However, the …

Jamming strategies for physical layer security

Y Huo, Y Tian, L Ma, X Cheng… - IEEE Wireless …, 2017 - ieeexplore.ieee.org
This article provides a comprehensive overview on jamming strategies in the physical layer
for securing wireless communications. As a complement to traditional cryptography-based …

On the security enhancement of uplink NOMA systems with jammer selection

K Cao, B Wang, H Ding, L Lv, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We investigate physical layer security of an uplink NOMA system consisting of one base
station, multiple users and one eavesdropper. During each uplink transmission, two users …

Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers

G Chen, JP Coon, M Di Renzo - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We analyze the secrecy outage probability in the downlink for wireless networks with
spatially (Poisson) distributed eavesdroppers (EDs) under the assumption that the base …

Optimal routing for multihop social-based D2D communications in the Internet of Things

G Chen, J Tang, JP Coon - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
With the development of wireless communications and the intellectualization of machines,
the Internet of Things (IoT) has been of interest to both industry and academia. Multihop …

Simultaneous wireless information power transfer for MISO secrecy channel

Z Chu, Z Zhu, M Johnston… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper investigates simultaneous wireless information and power transfer (SWIPT) for a
multiple-input-single-output (MISO) secrecy channel. First, transmit beamforming without …

Cooperative communication in physical layer security: Technologies and challenges

S Pahuja, P **dal - Wireless Personal Communications, 2019 - Springer
Cooperative communication utilizes node cooperation for enhancing the diversity gains
during secure communication against eavesdrop** and jamming which are the common …

IRS-aided uplink security enhancement via energy-harvesting jammer

T Qiao, Y Cao, J Tang, N Zhao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we investigate the security enhancement by combining intelligent reflecting
surface (IRS) and energy harvesting (EH) jammer for the uplink transmission. Specifically …