A full-duplex Bob in the MIMO Gaussian wiretap channel: Scheme and performance

L Li, Z Chen, D Zhang, J Fang - IEEE Signal Processing Letters, 2015 - ieeexplore.ieee.org
This letter considers secrecy communication from an information-theoretic perspective, and
studies the secrecy capacity of a multi-input multi-output (MIMO) Gaussian wiretap channel …

Security–reliability tradeoff analysis for SWIPT-and AF-based IoT networks with friendly jammers

TN Nguyen, DH Tran, T Van Chien… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Radio-frequency (RF) energy harvesting (EH) in wireless relaying networks has attracted
considerable recent interest, especially for supplying energy to relay nodes in the Internet of …

Adaptive full-duplex jamming receiver for secure D2D links in random networks

HM Wang, BQ Zhao, TX Zheng - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Device-to-device (D2D) communication raises new transmission secrecy protection
challenges, since conventional physical layer security approaches, such as multiple …

A counter-eavesdropping technique for optimized privacy of wireless industrial iot communications

JH Anajemba, C Iwendi, I Razzak… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The industrial Internet of Things (IIoTs) is a key component of the fourth industrial revolution
(Industry 4.0) which is faced with privacy issues as the scale and sensitivity of user and …

[HTML][HTML] A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices

S Rajesh, V Paul, VG Menon, MR Khosravi - Symmetry, 2019 - mdpi.com
Recent advancements in wireless technology have created an exponential rise in the
number of connected devices leading to the internet of things (IoT) revolution. Large …

Using symmetric and asymmetric cryptography to secure communication between devices in IoT

MS Henriques, NK Vernekar - 2017 International Conference …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows the interconnection of computing and sensing devices over
the Internet, allowing them to send and receive data. The applications of IoT range from …

Improving wireless secrecy rate via full-duplex relay-assisted protocols

S Parsaeefard, T Le-Ngoc - IEEE transactions on information …, 2015 - ieeexplore.ieee.org
In this paper, we examine the use of a friendly full-duplex (FD) relay to increase the secrecy
rate over a fading channel between the legitimate source and the destination in the …

Robust secure beamforming for intelligent reflecting surface assisted full-duplex MISO systems

Y Ge, J Fan - IEEE Transactions on Information Forensics and …, 2021 - ieeexplore.ieee.org
This paper investigates a full-duplex (FD) secure communication system with the assistance
of an intelligent reflecting surface (IRS). Compared with the traditional FD system, the IRS …

Secure communication in TDS-OFDM system using constellation rotation and noise insertion

R Ma, L Dai, Z Wang, J Wang - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Time-domain synchronous orthogonal frequency division multiplexing (TDS-OFDM) is the
key technology of Chinese digital television terrestrial broadcasting (DTTB) standard …

Covertness and secrecy study in untrusted relay-assisted D2D networks

R Sun, B Yang, Y Shen, X Jiang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article investigates the covertness and secrecy of wireless communications in an
untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base …