A survey of optimization approaches for wireless physical layer security
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …
increasing concerns from both academia and industry. The research on physical layer …
Improving physical layer security of uplink NOMA via energy harvesting jammers
We investigate the secrecy transmission of uplink non-orthogonal multiple access (NOMA)
with the aid of energy harvesting (EH) jammers. During each time frame, communication is …
with the aid of energy harvesting (EH) jammers. During each time frame, communication is …
Energy-efficient computation offloading for secure UAV-edge-computing systems
Characterized by their ease of deployment and bird's-eye view, unmanned aerial vehicles
(UAVs) may be widely deployed both in surveillance and traffic management. However, the …
(UAVs) may be widely deployed both in surveillance and traffic management. However, the …
Jamming strategies for physical layer security
This article provides a comprehensive overview on jamming strategies in the physical layer
for securing wireless communications. As a complement to traditional cryptography-based …
for securing wireless communications. As a complement to traditional cryptography-based …
On the security enhancement of uplink NOMA systems with jammer selection
We investigate physical layer security of an uplink NOMA system consisting of one base
station, multiple users and one eavesdropper. During each uplink transmission, two users …
station, multiple users and one eavesdropper. During each uplink transmission, two users …
Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers
We analyze the secrecy outage probability in the downlink for wireless networks with
spatially (Poisson) distributed eavesdroppers (EDs) under the assumption that the base …
spatially (Poisson) distributed eavesdroppers (EDs) under the assumption that the base …
Optimal routing for multihop social-based D2D communications in the Internet of Things
With the development of wireless communications and the intellectualization of machines,
the Internet of Things (IoT) has been of interest to both industry and academia. Multihop …
the Internet of Things (IoT) has been of interest to both industry and academia. Multihop …
Simultaneous wireless information power transfer for MISO secrecy channel
Z Chu, Z Zhu, M Johnston… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper investigates simultaneous wireless information and power transfer (SWIPT) for a
multiple-input-single-output (MISO) secrecy channel. First, transmit beamforming without …
multiple-input-single-output (MISO) secrecy channel. First, transmit beamforming without …
Cooperative communication in physical layer security: Technologies and challenges
S Pahuja, P **dal - Wireless Personal Communications, 2019 - Springer
Cooperative communication utilizes node cooperation for enhancing the diversity gains
during secure communication against eavesdrop** and jamming which are the common …
during secure communication against eavesdrop** and jamming which are the common …
IRS-aided uplink security enhancement via energy-harvesting jammer
In this paper, we investigate the security enhancement by combining intelligent reflecting
surface (IRS) and energy harvesting (EH) jammer for the uplink transmission. Specifically …
surface (IRS) and energy harvesting (EH) jammer for the uplink transmission. Specifically …