Security-aware cross-layer resource allocation for heterogeneous wireless networks

L Xu, H Xing, A Nallanathan, Y Yang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
… 10, we depict the convergence speed for the proposed security-awareness cross-layer
resource allocation algorithm. The number of MTs in each femtocell is M = 5. The total bandwidth …

Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: Active adversary

MR Abedi, N Mokari, H Saeedi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… artificial noise to improve physical layer security in a resource allocation framework. In this
paper, … In contrast, in [31], a robust secure resource allocation scheme is proposed in which, …

Resource allocation for physical layer security in heterogeneous network with hidden eavesdropper

G Shiqi, X Chengwen, F Zesong… - China …, 2016 - ieeexplore.ieee.org
… complicated resource allocation. Considering information security, the resource allocation
for … Then a joint resource allocation algorithm is proposed in our worN, which simultaneously …

Radio resource allocation for physical-layer security in D2D underlay communications

H Zhang, T Wang, L Song, Z Han - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
… Second, we consider the radio resource allocation problem by … Besides, we also provide
several other channel allocation, … described and the radio resource allocation problem is given …

Fair resource allocation in an intrusion-detection system for edge computing: Ensuring the security of Internet of Things devices

F Lin, Y Zhou, X An, I You… - IEEE Consumer …, 2018 - ieeexplore.ieee.org
… For the resource allocation requirements that may be involved, we designed a six-layer
edge computing intrusion-detection model, each layer of which is responsible for different func…

Physical layer security in UAV systems: Challenges and opportunities

X Sun, DWK Ng, Z Ding, Y Xu… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
… It is noted that resource allocation affects … layer security in UAV systems. We then provide
an overview of the joint design of resource allocation and trajectory for physical layer security

A new resource allocation mechanism for security of mobile edge computing system

H Hui, C Zhou, X An, F Lin - IEEE Access, 2019 - ieeexplore.ieee.org
… work of the analysis layer and management layer. MEC-IDS is a security technology that …
In this paper, we aim to develop a new resource allocation mechanism in MEC environment …

Joint resource allocation and trajectory design for UAV-aided wireless physical layer security

X Sun, C Shen, TH Chang… - 2018 IEEE Globecom …, 2018 - ieeexplore.ieee.org
… We emphasize that the UAVs enable new opportunities for secure transmissions. In
particular, a UAV-aided relay can adaptively adjust its flying trajectory and resource allocation

A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning

D Marabissi, A Abrardo, L Mucchi - Mobile Networks and Applications, 2023 - Springer
… radio resources allocation using reinforcement learning (Q-learning) to increase the security
… A coordinated scheduling among different cells using the same radio resources is proposed …

Energy-efficient resource allocation for secure OFDMA systems

DWK Ng, ES Lo, R Schober - IEEE Transactions on Vehicular …, 2012 - ieeexplore.ieee.org
layer security by Wyner [8] showed that in a wiretap channel, a source and a destination can
exchange perfectly secure … ], resource allocation with PHY layer security considerations was …