Secure communication and identification systems—Effective performance evaluation on Turing machines

H Boche, RF Schaefer, HV Poor - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Modern communication systems need to satisfy pre-specified requirements on spectral
efficiency and security. Physical layer security is a concept that unifies both and connects …

Iterative trajectory optimization for physical-layer secure buffer-aided UAV mobile relaying

L Shen, N Wang, X Ji, X Mu, L Cai - Sensors, 2019 - mdpi.com
With the fast development of commercial unmanned aerial vehicle (UAV) technology, there
are increasing research interests on UAV communications. In this work, the mobility and …

IF-over-fiber transmission of OFDM quantum-noise randomized PSK cipher for physical layer encryption of wireless signals

K Tanizawa, F Futami - Journal of Lightwave Technology, 2021 - ieeexplore.ieee.org
This study proposes an intensity modulation/direct detection intermediate frequency-over-
fiber (IFoF) system that generates a microwave orthogonal frequency-division multiplexing …

Securing massive MIMO systems: Secrecy for free with low-complexity architectures

A Bereyhi, S Asaad, RR Müller… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Passively overheard massive multiple-input multiple-output (MIMO) settings are capable of
suppressing eavesdroppers via narrow beamforming towards legitimate receivers. This …

Secure Body-Centric Internet of Things Networks: Physical Layer Security vs Covert Communication

X Wang, H Du, Y Gao, J Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the growing popularity of wearable devices, body-centric networks have become the
focus of Internet of Things (IoT) research. However, malicious eavesdroppers and attackers …

Physical layer secrecy of NOMA-based hybrid satellite-terrestrial relay networks

V Bankey, V Singh, PK Upadhyay - 2020 IEEE Wireless …, 2020 - ieeexplore.ieee.org
In this paper, we investigate the physical layer security of a non-orthogonal multiple access
(NOMA) based downlink hybrid satellite-terrestrial relay network where the satellite …

UAV-enabled secure data dissemination via artificial noise: Joint trajectory and communication optimization

A Li, W Zhang, S Dou - IEEE Access, 2020 - ieeexplore.ieee.org
This paper studies a single UAV-enabled secure data dissemination system, in which the
UAV is employed as an aerial base station to secretly communicate with multiple ground …

Secure User Pairing and Power Allocation for Downlink Non-Orthogonal Multiple Access against External Eavesdropping

Y Li, Y Chen, X Ji - Entropy, 2024 - mdpi.com
We propose a secure user pairing (UP) and power allocation (PA) strategy for a downlink
Non-Orthogonal Multiple Access (NOMA) system when there exists an external …

Exploiting TAS schemes to enhance the PHY-security in cooperative NOMA networks: A deep learning approach

Y Pramitarini, RHY Perdana, K Shim… - … Conference on Artificial …, 2023 - ieeexplore.ieee.org
In this paper, we propose a novel antenna selection scheme to enhance the secrecy
performance in a relay-aided non-orthogonal multiple access (NOMA) network against an …

Optimal inputs for some classes of degraded wiretap channels

A Dytso, M Egan, SM Perlaza, HV Poor… - 2018 IEEE Information …, 2018 - ieeexplore.ieee.org
In this paper, an analysis of an input distribution that achieves the secrecy capacity of a
general degraded additive noise wiretap channel is presented. In particular, using convex …