Secrecy performance analysis of wireless communications in the presence of UAV jammer and randomly located UAV eavesdroppers

J Tang, G Chen, JP Coon - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have been undergoing fast development for providing
broader signal coverage and more extensive surveillance capabilities in military and civilian …

A Systematic Literature Review of Security in 5G based Social Networks

MT Alshurideh, BY Obeidat, V Victoria… - … on Cyber Resilience …, 2022 - ieeexplore.ieee.org
With increase in the use of social networks, we also need the increase in the security of
those networks. Making the connection secure is critical and the priority now a day so that …

A novel communication paradigm for high capacity and security via programmable indoor wireless environments in next generation wireless systems

C Liaskos, S Nie, A Tsioliaridou, A Pitsillides… - Ad Hoc Networks, 2019 - Elsevier
Wireless communication environments comprise passive objects that cause performance
degradation and eavesdropping concerns due to anomalous scattering. This paper …

A survey on cryptographic methods to secure communications for UAV traffic management

R Aissaoui, JC Deneuville, C Guerber… - Vehicular …, 2023 - Elsevier
Abstract Unmanned Aerial Systems (UAS) have a wide variety of applications, and their
development in terms of capabilities is continuously evolving. Many missions performed by …

Physical layer security: Authentication, integrity, and confidentiality

M Shakiba-Herfeh, A Chorti, H Vincent Poor - Physical Layer Security, 2021 - Springer
The goal of physical layer security (PLS) is to make use of the properties of the physical
layer—including the wireless communication medium and/or the transceiver hardware—to …

Wiretap channels: Nonasymptotic fundamental limits

W Yang, RF Schaefer, HV Poor - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper investigates the maximal secret communication rate over a wiretap channel
subject to reliability and secrecy constraints at a given blocklength. New achievability and …

Blockchain mechanism and symmetric encryption in a wireless sensor network

AE Guerrero-Sanchez, EA Rivas-Araiza… - Sensors, 2020 - mdpi.com
The Internet of Things (IoT) paradigm allows the connection and exchange of information
between millions of smart devices. This paradigm grows and develops exponentially as do …

6G and the Post‐Shannon Theory

JA Cabrera, H Boche, C Deppe… - Shaping Future 6G …, 2021 - Wiley Online Library
Since the breakthrough of Shannon's seminal paper, researchers and engineers have
worked on codes and techniques that approach the fundamental limits of message …

Secure transmission designs for NOMA systems against internal and external eavesdropping

K Cao, B Wang, H Ding, T Li, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the
same resource block to improve the spectral efficiency. Whereas due to the resource …

[图书][B] Advanced optical and wireless communications systems

IB Djordjevic - 2018 - Springer
The purpose of this book is to introduce the reader to most advanced topics of (i) wireless
communications,(ii) free-space optical (FSO) communications,(iii) indoor optical wireless …