Resource Allocation for Secure SWIPT-Enabled D2D Communications With Fairness

Y Xu, B Gu, D Li, Z Yang, C Huang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Device-to-device (D2D) communication is an emerging paradigm that can improve system
capacity and spectral efficiency by using cooperative communication coexisting with cellular …

Power splitting-based SWIPT systems with full-duplex jamming

R Ma, H Wu, J Ou, S Yang, Y Gao - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The simultaneous wireless information and power transfer (SWIPT) has recently attracted
much attention since both information and energy are integrated within radio frequency …

A secure multiuser privacy technique for wireless IoT networks using stochastic privacy optimization

JH Anajemba, T Yue, C Iwendi… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
With the exponential increase of interconnected communicating devices which make up the
Internet of Things (IoT), securing the network transmission and the fifth generation (5G) …

Energy efficiency in secure IRS-aided SWIPT

J Liu, K Xiong, Y Lu, DWK Ng… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
This letter studies the energy efficiency (EE) in a secure intelligent reflecting surface (IRS)-
aided simultaneous wireless information and power transfer (SWIPT) network, where an …

A lightweight secure and resilient transmission scheme for the Internet of Things in the presence of a hostile jammer

M Letafati, A Kuhestani, KK Wong… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In this article, we propose a lightweight security scheme for ensuring both information
confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A …

NB-IoT security: A survey

V Kumar, RK Jha, S Jain - Wireless Personal Communications, 2020 - Springer
In the past few years, the term Internet of Things (IoT) has become very prevalent. In IoT,
aggregation of data (from sensors) to processing the data (to the cloud) is energy constraint …

Application of full-duplex wireless technique into secure MIMO communication: Achievable secrecy rate based optimization

Y Zhou, ZZ Xiang, Y Zhu, Z Xue - IEEE Signal Processing …, 2014 - ieeexplore.ieee.org
This letter considers the secure MIMO transmission in a wireless environment, in which one
transmitter (Alice), one receiver (Bob) and one eavesdropper (Eve) are involved. Apart from …

A new design paradigm for secure full-duplex multiuser systems

VD Nguyen, HV Nguyen, OA Dobre… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
We consider a full-duplex (FD) multiuser system where an FD base station (BS) is designed
to simultaneously serve both downlink (DL) and uplink (UL) users in the presence of half …

Sensing-assisted secure uplink communications with full-duplex base station

X Wang, Z Fei, JA Zhang… - IEEE communications …, 2021 - ieeexplore.ieee.org
This letter proposes a sensing-assisted uplink communications framework between a single-
antenna user and a full-duplex (FD) base station (BS) against an aerial eavesdropper (AE) …

TRIFECTA: security, energy efficiency, and communication capacity comparison for wireless IoT devices

S Sen, J Koo, S Bagchi - IEEE Internet Computing, 2018 - ieeexplore.ieee.org
The widespread proliferation of sensor nodes in the era of the Internet of Things (IoT),
coupled with increasing sensor fidelity and data acquisition modality, is expected to …