Energy-efficient secure transmission design for the Internet of Things with an untrusted relay

D Chen, W Yang, J Hu, Y Cai, X Tang - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we investigate secure uplink transmission in a typical Internet of Things (IoT)
deployment, where multiple sensors communicate with a controller via the assistance of an …

On security and throughput for energy harvesting untrusted relays in IoT systems using NOMA

C So-In, H Tran, DD Tran, S Heng… - IEEE …, 2019 - ieeexplore.ieee.org
In this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO)
energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base …

Secure downlink transmission in the Internet of Things: How many antennas are needed?

J Hu, N Yang, Y Cai - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
Physical layer security is a promising way to secure the wireless communications in the
Internet of Things (IoT). Motivated by the fact that the limited feedback resources in the IoT …

Secrecy performance analysis for fixed-gain energy harvesting in an Internet of Things with untrusted relays

DD Tran, C So-In, H Tran - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of
Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the …

Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for Internet of Things

M Letafati, A Kuhestani… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cooperative relaying can be introduced as a promising approach for data communication in
the Internet of Things (IoT), where the source and the destination may be placed far away. In …

Cooperative jamming for physical layer security enhancement in Internet of Things

L Hu, H Wen, B Wu, F Pan, RF Liao… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is becoming an emerging paradigm to achieve ubiquitous
connectivity, via massive deployment of physical objects, such as sensors, controllers, and …

3-D stochastic geometry-based modeling and performance analysis of efficient security enhancement scheme for IoT systems

H Chamkhia, A Erbad, AK Al-Ali… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) systems are becoming core building blocks for different services and
applications supporting every day's life. The heterogeneous nature of IoT devices and the …

Optimization of secure wireless communications for IoT networks in the presence of eavesdroppers

SA Haider, MN Adil, MJ Zhao - Computer Communications, 2020 - Elsevier
The problem motivates this paper is that securing the critical data of 5G based wireless IoT
network is of significant importance. Wireless 5G IoT systems consist of a large number of …

IQ-impaired wireless-powered modify-and-forward relaying for IoT networks: An in-depth physical-layer security analysis

X Li, H Qi, DT Do, Z Hui, Y Ding… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the large-scale commercialization of 5G networks, the era of Internet of Things (IoT),
which is oriented toward the Internet of Everything (IoE), is coming. Under the circumstance …

On the security–reliability and secrecy throughput of random mobile user in Internet of Things

J Tang, H Wen, H Song, T Zhang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Physical-layer security (PLS) in Internet of Things (IoT) has attracted great attentions
recently. Although mobility is an intrinsic property of IoT networks, most of the existing works …