A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Future generation communications with game strategies: A comprehensive survey

R Gupta, J Gupta - Computer Communications, 2022 - Elsevier
For an effective, low latency, and ultra reliable pervasive connectivity among next-
generation wireless networks such as Internet of Things (IoT) devices, machine-to-machine …

Enabling cyber‐physical communication in 5G cellular networks: challenges, spatial spectrum sensing, and cyber‐security

R Atat, L Liu, H Chen, J Wu, H Li… - IET Cyber‐Physical …, 2017 - Wiley Online Library
Cyber‐physical systems (CPS) help create new services and applications by revolutionising
our world in different fields through their tight interactions and automated decisions. This is …

The impact of mobility on physical layer security of 5G IoT networks

K Yu, J Yu, C Luo - IEEE/ACM Transactions on Networking, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is rapidly spreading and reaching a multitude of different domains,
since the fifth generation (5G) wireless technologies are the key enablers of many IoT …

Secure communications in tiered 5G wireless networks with cooperative jamming

Y Huo, X Fan, L Ma, X Cheng, Z Tian… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cooperative jamming is deemed as a promising physical layer-based approach to secure
wireless transmissions in the presence of eavesdroppers. In this paper, we investigate …

Secrecy energy efficiency optimization for artificial noise aided physical-layer security in OFDM-based cognitive radio networks

Y Jiang, Y Zou, J Ouyang, J Zhu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we investigate the power allocation of primary base station (PBS) and
cognitive base station (CBS) across different orthogonal frequency division multiplexing …

Differential game approach for attack-defense strategy analysis in Internet of Things networks

H Wu, Q Gao, X Tao, N Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is vulnerable to various cyber attacks due to the massive deployment
of IoT devices and the openness of wireless environments. In this article, taking IoT devices …

Analysis on secrecy capacity of cooperative non-orthogonal multiple access with proactive jamming

C Yuan, X Tao, N Li, W Ni, RP Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper analyzes the secrecy capacity of a cooperative relaying system using non-
orthogonal multiple access (NOMA). A new cooperative NOMA scheme is proposed, where …

Secure transmission in SWIPT-powered two-way untrusted relay networks

J Zhang, X Tao, H Wu, X Zhang - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we investigate the secure transmission in two-way untrusted amplify-and-
forward relay networks with simultaneous wireless information and power transfer (SWIPT) …

Cooperative jamming for secure transmission with both active and passive eavesdroppers

J Si, Z Cheng, Z Li, J Cheng, HM Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Secrecy transmission is investigated for a cooperative jamming scheme, where a multi-
antenna jammer generates artificial noise (AN) to confuse eavesdroppers. Two kinds of …