Secure communication in NOMA-assisted millimeter-wave SWIPT UAV networks

X Sun, W Yang, Y Cai - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
schemes are derived using stochastic geometry. Then, we optimize the active antenna selection
… WITH DM We consider the performance of two multiple access schemes, ie, NOMA and …

Robust transmission design for intelligent reflecting surface-aided secure communication systems with imperfect cascaded CSI

S Hong, C Pan, H Ren, K Wang… - … Communications, 2020 - ieeexplore.ieee.org
… There are various schemes to improve the physical layer security [14], such as the
multiple-antenna techniques [15], cooperative relaying [16], artificial noise (AN) [17], and cooperative …

Secrecy outage analysis for cooperative NOMA systems with relay selection schemes

H Lei, Z Yang, KH Park, IS Ansari, Y Guo… - … on Communications, 2019 - ieeexplore.ieee.org
… To deal with the security issues followed by the explosive increase in cellular data, … layer
security (PLS) is emerging as one of the most promising ways to ensure secure communication

Robust and secure wireless communications via intelligent reflecting surfaces

X Yu, D Xu, Y Sun, DWK Ng… - … Areas in Communications, 2020 - ieeexplore.ieee.org
… Our results also confirmed the robustness of the proposed scheme with respect to imperfect
CSI and its ability to exploit multiuser diversity. Furthermore, design guidelines for multi-IRS …

Physical secure optical communication based on private chaotic spectral phase encryption/decryption

N Jiang, A Zhao, C Xue, J Tang, K Qiu - Optics letters, 2019 - opg.optica.org
… -speed physically secure optical communication scheme based … The proposed secure scheme
supports secure high-speed … compatible with the existing optical communication systems. …

Secure UAV communication networks over 5G

B Li, Z Fei, Y Zhang, M Guizani - … Wireless Communications, 2019 - ieeexplore.ieee.org
… antenna technique, relay selection, and friendly jamming are accordingly utilized to strengthen
a … For the purpose of comparison, we consider three schemes as the benchmarks, that is, …

An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks

OA Khashan, R Ahmad, NM Khafajah - Ad Hoc Networks, 2021 - Elsevier
… The key (k) in our scheme is randomly selected by the sensor node based on the key pre-distribution
approach each time that the data is transmitted. A detailed description of the key …

Achieving reliable and secure communications in wireless-powered NOMA systems

K Cao, B Wang, H Ding, L Lv, J Tian… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
scheme to achieve reliable and secure communications for the considered system. To be
specific, the dynamic power allocation is developed to ensure successful decoding of the RRU …

An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs

I Ali, F Li - Vehicular Communications, 2020 - Elsevier
… One major issue faced by most current state of the art schemes that concentrate on
secure communication in VANETs is that of efficiency. These schemes do possess the …

Secure communication based on quantized synchronization of chaotic neural networks under an event-triggered strategy

W He, T Luo, Y Tang, W Du, YC Tian… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
… When σ is selected to be zero, the event-triggered condition is equivalent … In this section, a
secure communication scheme will be presented based on the master–slave synchronization …