Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT

F Zhou, Z Chu, H Sun, RQ Hu… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) have been deemed two
promising technologies due to their potential to achieve high spectral efficiency and massive …

A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

Physical layer security in cognitive radio inspired NOMA network

Z Xiang, W Yang, G Pan, Y Cai… - IEEE Journal of Selected …, 2019 - ieeexplore.ieee.org
This paper investigates physical layer security (PLS) in cognitive radio inspired non-
orthogonal multiple access (CR-NOMA) networks with multiple primary and secondary …

Robust AN-aided beamforming and power splitting design for secure MISO cognitive radio with SWIPT

F Zhou, Z Li, J Cheng, Q Li, J Si - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
A multiple-input single-output cognitive radio downlink network is studied with simultaneous
wireless information and power transfer. In this network, a secondary user coexists with …

Securing physical-layer communications for cognitive radio networks

Y Zou, J Zhu, L Yang, YC Liang… - IEEE Communications …, 2015 - ieeexplore.ieee.org
This article investigates the physical-layer security of CR networks, which are vulnerable to
various newly arising attacks targeting the weaknesses of CR communications and …

Robust secure beamforming for 5G cellular networks coexisting with satellite networks

Z Lin, M Lin, JB Wang, Y Huang… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
This paper studies the robust secure beamforming (BF) issue of fifth generation (5G) cellular
system operating at millimeter wave frequency and coexisting with a satellite network. By …

Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming

H Zhang, H Xing, J Cheng… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We consider secure resource allocations for orthogonal frequency division multiple access
(OFDMA) two-way relay wireless sensor networks (WSNs). The joint problem of subcarrier …