On secure wireless communications for service oriented computing

Y Zhang, Y Shen, H Wang, Y Zhang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
… To fully characterize the security and reliability performances of the transmission, we adopt
the … interests include computer communications networks, mainly wireless networks, optical …

Secure transmission and power allocation in multiuser distributed massive MIMO systems

X Zhang, D Guo, K An, W Ma, K Guo - Wireless Networks, 2020 - Springer
… For the distributed massive MIMO systems, it is necessary to allocate power among
RRHS optimally for secure communications. Based on these results, we consider the power …

Secure transmission via beamforming optimization for NOMA networks

Y Cao, N Zhao, Y Chen, M Jin, Z Ding… - … Communications, 2019 - ieeexplore.ieee.org
… to secure transmission in NOMA systems. Hence, in this article, secure transmission schemes
… external eavesdropping for downlink multi-input single-output NOMA networks. Using the …

SeDS: Secure data sharing strategy for D2D communication in LTE-Advanced networks

A Zhang, J Chen, RQ Hu, Y Qian - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
… problem of security assurance for data transmission in D2D … communication networks has
been extensively investigated … on the other security issues in D2D communication. Especially…

Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation

X Zhou, MR McKay - IEEE Transactions on Vehicular …, 2010 - ieeexplore.ieee.org
… the problem of secure communication with multi-antenna transmission in fading channels. …
the objective function to optimize the transmit power allocation between the information signal …

Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers

X Hu, X Zhang, H Huang, Y Li - … Mobile Radio Communications …, 2016 - ieeexplore.ieee.org
security (PLS) in an underlay cognitive radio (CR) network. Under an interference constraint
set by the primary user, we propose a secure transmission … of its power to transmit jamming …

Secure routing and data transmission in mobile ad hoc networks

WS Alnumay, U Ghosh - arXiv preprint arXiv:1402.2108, 2014 - arxiv.org
secure information exchange and to avoid the security threats. However, establishing secure
communication … defense; (c) selforganizing and dynamic network; (d) most of the messages …

Physical layer security approaches in 5G wireless communication networks

P Singh, P Pawar, A Trivedi - … Computing and Communication  …, 2018 - ieeexplore.ieee.org
… in the 5G wireless networks is the pivotal issue for research. In this paper, the importance of
Physical Layer Security (PLS) for secure transmission of information in wireless networks are …

Physical-layer security in multiuser visible light communication networks

L Yin, H Haas - … Journal on Selected Areas in Communications, 2017 - ieeexplore.ieee.org
… We consider a downlink transmission scenario of a multiuser VLC network with the presence
of both legitimate users and eavesdroppers inside a three-dimensional space. The VLC …

Secure transmission design for aerial IRS assisted wireless networks

W Wei, X Pang, J Tang, N Zhao, X Wang… - … on Communications, 2023 - ieeexplore.ieee.org
… more challenging to secure the air-ground transmission, due … -assisted secure transmission
design in wireless networks. In … users, while ensuring their security. We aim to maximize the …