Physical layer security assisted computation offloading in intelligently connected vehicle networks

Y Liu, W Wang, HH Chen, F Lyu, L Wang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this paper, we propose a secure computationoffloading scheme (SCOS) in intelligently
connected vehicle (ICV) networks, aiming to minimize overall latency of computing via …

Secure V2V communications via relays: Resource allocation and performance analysis

D Han, B Bai, W Chen - IEEE Wireless Communications Letters, 2017 - ieeexplore.ieee.org
In this letter, we will investigate the joint relay selection and subcarrier allocation problem for
decode-and-forward relay assisted secure vehicle-to-vehicle (V2V) communications, where …

Cooperative relaying and jamming for primary secure communication in cognitive two-way networks

D Wang, P Ren, Q Du, L Sun… - 2016 IEEE 83rd vehicular …, 2016 - ieeexplore.ieee.org
In this paper, we investigate a new cooperative paradigm to provide information security for
the primary system in cognitive two-way networks where the two-way secondary system can …

Secrecy outage analysis with Kth best relay selection in dual-hop inter-vehicle communication systems

J Zhang, G Pan - AEU-International Journal of Electronics and …, 2017 - Elsevier
In this paper, we investigate the secrecy outage performance of a dual-hop inter-vehicle
communication system, in which all nodes are in motion and all fading channels are …

Secrecy performance evaluation and enhancement of vehicle-to-vehicle communications in the presence of big vehicles

MG Abd El Ghafour, AH Abd El-Malek… - Vehicular …, 2024 - Elsevier
Despite its significant role in providing and developing reliable and safe intelligent
transportation services, the Internet of Vehicles faces several challenges and security …

Secure Vehicular Communications With Varying QoS and Environments: A Unified Cross-Layer Policy-Adaptation Approach

Y Xiao, Q Du, Y Zhang, C Lu - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
With the ubiquitous connectivity in internet of vehicles, secure transmission is of vital
importance for intelligent vehicle-to-everything (V2X) communications. However, in order to …

Relay selection for secrecy improvement in cognitive amplify‐and‐forward relay networks against multiple eavesdroppers

X Ding, T Song, Y Zou, X Chen - IET Communications, 2016 - Wiley Online Library
In this study, the authors investigate the physical‐layer security in a cognitive amplify‐and‐
forward relay network consisting of a secondary transmitter (ST) and a secondary …

Secrecy performance for RIS-based integrated satellite vehicle networks with a UAV relay and MRC eavesdropping

F Zhou, X Li, M Alazab, RH Jhaveri… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
This work investigates the secrecy issues for the secrecy reconfigurable intelligent surface-
based integrated satellite unmanned aerial vehicle (UAV) relay networks with multiple …

Robust chance-constrained trajectory and transmit power optimization for UAV-Enabled CR networks

Y Zhou, H Zhou, F Zhou, DWK Ng… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Cognitive radio is a promising technology to improve spectral efficiency. However,
communication security of a secondary network is limited by its transmit power and channel …

Secrecy outage probability of cognitive decode-and-forward relay networks

Y Yuan, R Zhao, H Lin, A Liu - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
This paper investigates the secrecy performance of cognitive decode-and-forward (DF) relay
networks with multiple primary users (PUs) receivers, one secondary user (SU) source …