RIS-aided physical layer security with full-duplex jamming in underlay D2D networks

W Khalid, H Yu, DT Do, Z Kaleem, S Noh - IEEE Access, 2021 - ieeexplore.ieee.org
This paper investigates the physical layer security and data transmission for the underlay
device-to-device (D2D) networks, and considers a combination of the reconfigurable …

Reconfigurable intelligent surfaces-aided physical layer security enhancement in D2D underlay communications

MH Khoshafa, TMN Ngatched… - IEEE Communications …, 2020 - ieeexplore.ieee.org
This letter investigates a reconfigurable intelligent surfaces (RIS)-aided wireless
communication system in an inband underlay Device-to-Device (D2D) communication …

Secure transmission in wiretap channels using full-duplex relay-aided D2D communications with outdated CSI

MH Khoshafa, TMN Ngatched… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
This letter examines the physical layer security of a cellular network with inband underlay
relay-aided Device-to-Device (D2D) communication, considering the scenario where the …

On the physical layer security of underlay relay-aided device-to-device communications

MH Khoshafa, TMN Ngatched… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we study the underlay relay-aided Device-to-Device (D2D) communications to
improve the physical layer (PHY) security of the cellular network. We propose a cooperative …

Adaptive full-duplex jamming receiver for secure D2D links in random networks

HM Wang, BQ Zhao, TX Zheng - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Device-to-device (D2D) communication raises new transmission secrecy protection
challenges, since conventional physical layer security approaches, such as multiple …

Enhanced physical layer security in D2D spectrum sharing networks

W Wang, KC Teh, KH Li - IEEE Wireless Communications …, 2016 - ieeexplore.ieee.org
In this letter, the issue of security for device-to-device (D2D) underlaying cellular networks is
considered. The cellular communication is overheard by randomly distributed …

Radio resource allocation for physical-layer security in D2D underlay communications

H Zhang, T Wang, L Song, Z Han - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Device-to-Device (D2D) communications have been proposed recently to improve the
spectral efficiency. In this paper, we consider physical-layer security in D2D communication …

Covertness and secrecy study in untrusted relay-assisted D2D networks

R Sun, B Yang, Y Shen, X Jiang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article investigates the covertness and secrecy of wireless communications in an
untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base …

Confidential information ensurance through physical layer security in device-to-device communication

M Waqas, M Ahmed, J Zhang… - 2018 IEEE Global …, 2018 - ieeexplore.ieee.org
This paper inquires the achievement of secret key generation (SKG) in device-to-device
(D2D) communications with the aid of relay. The confidential information between D2D …

Socially aware secrecy-ensured resource allocation in D2D underlay communication: An overlapping coalitional game scheme

M Ahmed, H Shi, X Chen, Y Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the popularity of proximity-based services, device-to-device (D2D) communication
underlaying cellular networks is a promising technology to cope with the growing demands …