An encryption-aware PHY security framework for 4-node Gaussian wiretap channels with joint power constraint

T Sadig, M Maleki, NH Tran… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In traditional physical layer security paradigm, no leakage of confidential information to the
eavesdropper is tolerated regardless of whether the message is encrypted or not. This will …

Cooperative jamming secure scheme for iwns random mobile users aided by edge computing intelligent node selection

T Zhang, H Wen, J Tang, H Song… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The cooperative physical layer security scheme can enhance the communication security of
industrial wireless nodes that are computing and energy limitation, which provides the …

Secure transmission design with feedback compression for the Internet of Things

J Hu, Y Cai, N Yang - IEEE Transactions on Signal Processing, 2017 - ieeexplore.ieee.org
Physical layer security is an emerging technique to protect the wireless communications in
the Internet of Things (IoT). Motivated by the fact that a single IoT terminal usually occupies a …

Physical-Layer Secure Wireless Transmission via Active Reconfigurable Intelligent Surfaces

Y Wang, J Peng - 2022 IEEE 4th International Conference on …, 2022 - ieeexplore.ieee.org
The development of Internet of things (IoT) has substantially increases the number of access
users and their transmission rates. When the number of access users is increasing …

Secrecy rate comparison of key-based encrypted data transmission and keyless secure transmission

Z Yu, Z Ji, PL Yeoh - 2021 IEEE Globecom Workshops (GC …, 2021 - ieeexplore.ieee.org
This paper compares the secrecy rate of two general PHY security approaches of keyless
secure transmission (ST) and key-based encrypted data transmission (EDT) in a multiple …

Secure Green‐Oriented Multiuser Scheduling for Wireless‐Powered Internet of Things

X Shang, H Yin, A Liu, M Li, Y Wang… - … and Mobile Computing, 2020 - Wiley Online Library
In this paper, we consider the secure green‐oriented multiuser scheduling for the wireless‐
powered Internet of Things (IoT) scenario, in which multiple source sensors communicate …

Intelligent secure communication for Internet of Things with statistical channel state information of attacker

J Xia, Y Xu, D Deng, Q Zhou, L Fan - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate the power control strategy of intelligent secure communication
with statistic channel state information (CSI) for Internet of Things (IoT) networks, where a …

Outage constrained secrecy rate maximization of intelligent reflecting surface aided transmission

Z Li, S Wang, M Wen, YC Wu - ICC 2021-IEEE International …, 2021 - ieeexplore.ieee.org
Intelligent reflecting surface (IRS) has the potential to significantly enhance the network
secure transmission performance by reconfiguring the wireless propagation environment …

On secrecy performance of industrial internet of things

F Jameel, MA Javed, DNK Jayakody… - Internet Technology …, 2018 - Wiley Online Library
Physical layer security has been shown to hold promise as a new paradigm for securing
wireless links. This paper provides secrecy performance analysis for industrial Internet of …

Gradient ascent algorithm for enhancing secrecy rate in wireless communications for smart grid

N Mensi, DB Rawat, E Balti - IEEE Transactions on Green …, 2021 - ieeexplore.ieee.org
The emerging Internet of Things (IoT) and bidirectional communications in smart grid are
expected to improve smart grid capabilities and electricity management. Because of massive …