Pilot and data power allocation in Poisson interference field with protected zone for physical-layer security

S Ahn, SI Park, J Kang, S Jeong - IEEE Wireless …, 2020 - ieeexplore.ieee.org
… We consider a wiretap channel in an interference-limited ad-hoc WLAN as illustrated in Fig.
1, where the legitimate transmitter (Alice) attempts a secure … The multiple interfering nodes at …

Relay selection for security-constrained cooperative communication in the presence of eavesdropper's overhearing and interference

S Vahidian, S Aïssa, S Hatamnia - IEEE Wireless …, 2015 - ieeexplore.ieee.org
… Abstract—This paper addresses the problem of secure communication in a cooperative
network operating in the presence of an eavesdropper as well as co-channel interference. Two …

Multi-antenna relay aided wireless physical layer security

X Chen, C Zhong, C Yuen… - IEEE Communications …, 2015 - ieeexplore.ieee.org
… to guarantee secure communications in the presence of possible … interference to the
destination. However, even with residual interference, it may still be beneficial for wireless security to …

Safeguarding wireless network with UAVs: A physical layer security perspective

Q Wu, W Mei, R Zhang - IEEE Wireless Communications, 2019 - ieeexplore.ieee.org
interference to the terrestrial communications, and thus effective air-ground … secure UAV-ground
communications in the presence of terrestrial eavesdroppers/jammers, as well as secure

Intercept probability analysis of wireless networks in the presence of eavesdropping attack with co-channel interference

JM Moualeu, W Hamouda, F Takawira - IEEE Access, 2018 - ieeexplore.ieee.org
… for secure communications in the presence of CCI, our key goal is twofold: a) to investigate
the joint effect of CCI and fading characteristics of the interference … the secure performance (in …

Analysis of selection combining hybrid FSO/RF systems considering physical layer security and interference

H Liang, Y Li, M Miao, C Gao, X Li - Optics Communications, 2021 - Elsevier
interference link undergo Nakagami-m distribution. The SNR of the transmitter and interference
… Ω 1 and Ω 2 are the mean value of RF and interference link Gamma RVs respectively. γ …

Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks

R Zhang, X Cheng, L Yang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
… D2D and cellular system in the presence of a multi-antenna … In this paper, we investigate the
physical layer security issue … we consider a more general interference scenario that multiple …

Proposed relay selection scheme for physical layer security in cognitive radio networks

H Sakran, M Shokair, O Nasr, S El-Rabaie, AA El-Azm - Iet Communications, 2012 - IET
… Abstract: In this study, the physical layer security for cognitive … user (PU) in the
presence of an eavesdropper receiver. … to the interference power constraints at the PUs (interference

Large-scale MIMO relaying techniques for physical layer security: AF or DF?

X Chen, L Lei, H Zhang, C Yuen - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
… over the multi-antenna non-regenerative relay assisted multi-carrier interference channel
[24… and one relay deploying NR antennas in presence of a passive eavesdropper, as shown in …

Physical-layer Security with Interference Generation by the Receiver

AHC Silva - 2020 - estudogeral.uc.pt
Security is a requirement that is present on every technological interaction. In order to improve
secrecy at physical layer of a communication within the presence of an eavesdropper, this …