Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities

N Wang, P Wang, A Alipour-Fanid… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
… • Proactive jamming: Proactive jamming attackers would send jamming or interfering signals
… uplink rate for a single user with the presence of a pilot jamming attacker. By estimating the …

A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
… , physical layer security (PHY-security) enables the secure … , eg, fading, noise, and
interferences, so as to avoid the use of … MIMO Gaussian interference channels in the presence of …

SIR meta distribution in physical layer security with interference correlation

Q Cui, X Jiang, X Yu, Y Wang… - 2018 IEEE Global …, 2018 - ieeexplore.ieee.org
… We consider the problem of physical layer security in a single-tier downlink network. The
base stations (BSs) are distributed according to a homogeneous Poisson point process (PPP) …

Information Security During Interference Attacks

A Farraj, E Hammad - Internet of Things Security and Privacy …, 2023 - books.google.com
… In the presence of an ongoing jamming interference created by the adversary, the proposed
game-theoretic transmission strategy allows the IoT device to achieve a target outage …

Applications of absorptive reconfigurable intelligent surfaces in interference mitigation and physical layer security

F Wang, AL Swindlehurst - IEEE Transactions on Wireless …, 2023 - ieeexplore.ieee.org
… An RIS is leveraged in [38] for secure parameter estimation at a wireless sensor network
fusion center operating in the presence of an eavesdropper. In [39], artificial noise (AN) is …

Resource allocation for joint interference management and security enhancement in cellular-connected Internet-of-Drones networks

MZ Hassan, G Kaddoum, O Akhrif - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… enhanced data transmission security and efficient interference management to … interference
and enhance the physical layer security of cellular-connected IoD networks in the presence

Physical layer security in UAV systems: Challenges and opportunities

X Sun, DWK Ng, Z Ding, Y Xu… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
layer security, especially against passive eavesdropping. As such, to investigate the security
issues in the presence … active eavesdroppers can efficiently interfere the legitimate receiver. …

Improving wireless physical layer security via cooperating relays

L Dong, Z Han, AP Petropulu… - IEEE transactions on …, 2009 - ieeexplore.ieee.org
… of multiple relays in the presence of one or more eavesdroppers. … For DF in the presence of
one eavesdropper, we derive the … is needed for creating larger interference and less power is …

Safeguarding 5G wireless communication networks using physical layer security

N Yang, L Wang, G Geraci, M Elkashlan… - IEEE …, 2015 - ieeexplore.ieee.org
layer security can be evaluated by applying systemlevel simulations to approximate the
distributions of signal-to-interference-… We note that the presence of hardware impairments also …

Perfect secrecy in physical-layer network coding systems from structured interference

DA Karpuk, A Chorti - … on Information Forensics and Security, 2016 - ieeexplore.ieee.org
security challenges. An alternative theoretical framework for the study of data confidentiality
in the physical layer of wireless networks, dubbed as physical layer security [… the presence of …