A comprehensive survey on cooperative relaying and jamming strategies for physical layer security
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …
conventional cryptographic schemes for securing wireless links. Many studies have shown …
A review of physical layer security techniques for Internet of Things: Challenges and solutions
With the uninterrupted revolution of communications technologies and the great-leap-
forward development of emerging applications, the ubiquitous deployment of Internet of …
forward development of emerging applications, the ubiquitous deployment of Internet of …
Secrecy performance analysis of UAV assisted relay transmission for cognitive network with energy harvesting
The unmanned aerial vehicle (UAV) assisted transmission can significantly improve the
spectrum efficiency and coverage of the wireless communication network. The paper …
spectrum efficiency and coverage of the wireless communication network. The paper …
On the uplink max–min SINR of cell-free massive MIMO systems
A cell-free massive multiple-input multiple-output system is considered using a max-min
approach to maximize the minimum user rate with per-user power constraints. First, an …
approach to maximize the minimum user rate with per-user power constraints. First, an …
Robust 3D-trajectory and time switching optimization for dual-UAV-enabled secure communications
This paper investigates a dual-unmanned aerial vehicle (UAV)-enabled secure
communication system, in which, a UAV moves around to send confidential messages to a …
communication system, in which, a UAV moves around to send confidential messages to a …
Energy-constrained UAV-assisted secure communications with position optimization and cooperative jamming
In this paper, we consider an energy-constrained unmanned aerial vehicle (UAV)-enabled
mobile relay assisted secure communication system in the presence of a legitimate source …
mobile relay assisted secure communication system in the presence of a legitimate source …
Secrecy rate analysis of UAV-enabled mmWave networks using Matérn hardcore point processes
Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as
an effective solution to provide large coverage and dynamic capacity for both military and …
an effective solution to provide large coverage and dynamic capacity for both military and …
Energy-efficient cooperative secure transmission in multi-UAV-enabled wireless networks
This paper investigates a multiple unmanned aerial vehicles (UAVs) enabled cooperative
secure transmission scheme in the presence of multiple potential eavesdroppers …
secure transmission scheme in the presence of multiple potential eavesdroppers …
Joint trajectory design and resource allocation for secure transmission in cache-enabled UAV-relaying networks with D2D communications
With the exponential growth of data traffic, the use of caching and device-to-device (D2D)
communication has been recognized as an effective approach for mitigating the backhaul …
communication has been recognized as an effective approach for mitigating the backhaul …
An overview of key technologies in physical layer security
A Sanenga, GA Mapunda, TML Jacob, L Marata… - Entropy, 2020 - mdpi.com
The open nature of radio propagation enables ubiquitous wireless communication. This
allows for seamless data transmission. However, unauthorized users may pose a threat to …
allows for seamless data transmission. However, unauthorized users may pose a threat to …