Opportunistic Wiretapping/jamming: A new attack model in millimeter-wave wireless networks

Y Zhang, Z Zheng, J He, S Zhao, Q Qu… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
While the millimeter-wave (mmWave) communication is less susceptible against the
conventional wiretapping attack due to its short transmission range and directivity, this paper …

Hybrid Grey Wolf Optimization with Cuckoo Search‐based optimal channel estimation for energy efficient massive multiple input multiple output

G Indumathi, S Nisha Rani - International Journal of …, 2022 - Wiley Online Library
The massive multiple input multiple output (mMIMO) provides reliable base station (BS) for
the mobile users (MUs) with CSI (channel state information) and jointly offers spectral …

Secure resource allocation for cooperative OFDMA system with untrusted AF relaying

Y Jin, X Li, G Lv, M Zhao, Y Jin - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, we consider a cooperative orthogonal frequency division multiple access
(OFDMA) system, where a source communicates with multiple users with the help of an …

Secrecy outage performance of MIMO-NOMA relay systems with MRT/MRC schemes

N Le Cuong, TM Hoang, PT Hiep - Computer Communications, 2024 - Elsevier
Non-orthogonal multiple access (NOMA) systems have indicated that they can provide
higher spectral efficiency and secrecy capability compared with orthogonal multiple access …

Secrecy rate optimization for dual‐functional radar‐communication system with energy receiver

X Tong, X Li, F Dong, W Wang… - Transactions on Emerging …, 2022 - Wiley Online Library
This article studies the secrecy rate optimization in the downlink transmission of a dual‐
functional radar‐communication system, under the simultaneous wireless information and …

Process-and-Forward two-way relay using multiple space-time line codes

J Choi, J Joung - Signal Processing, 2022 - Elsevier
In this paper, we consider a two-way relay (TWR) network that two source nodes (SNs) with
multiple antennas exchange data to each other via a relay node (RN) with multiple …

Constellation-overlapping-based secure transmission for two-way untrusted relaying: Method, implementation, and experimental results

L Sun, H Xu, Y Zhang - IEEE Wireless Communications Letters, 2020 - ieeexplore.ieee.org
In this letter we present a physical-layer-security (PLS) experimental platform that realizes
secure transmission over a two-way untrusted relaying system. A novel PLS approach called …

A reduced hardware complexity algorithm with improved outage probability for 5G communication system

A Taneja, N Saluja - International Journal of …, 2022 - inderscienceonline.com
In this paper, a 5G mobile communication system is considered with cooperative
environment. The mobile and base-station node communicate with each other through a …

Key Exchange for Two-Way Untrusted Relaying Systems Through Constellation Overlapping

W Li, M Huang, X Lu - IEEE Communications Letters, 2024 - ieeexplore.ieee.org
This letter proposes a key exchange scheme for the untrusted relay system, where the relay
not only assists in message transmission but also tries to recover messages. Terminal users …

Downlink Power Minimization in Intelligent Reflecting Surface Aided Security Classification Wireless Communications System

J Xing, T Lv, Y Cao, J Zeng, P Huang - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
User privacy protection is considered a critical issue in wireless networks, which drives the
demand for various secure information interaction techniques. In this article, we introduce an …