Mobile jammer-aided secure UAV communications via trajectory design and power control

A Li, W Zhang - China Communications, 2018 - ieeexplore.ieee.org
To further promote the achievable average secrecy rate for UAV-ground communications, a
UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional …

Secure communications in tiered 5G wireless networks with cooperative jamming

Y Huo, X Fan, L Ma, X Cheng, Z Tian… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cooperative jamming is deemed as a promising physical layer-based approach to secure
wireless transmissions in the presence of eavesdroppers. In this paper, we investigate …

Future generation communications with game strategies: A comprehensive survey

R Gupta, J Gupta - Computer Communications, 2022 - Elsevier
For an effective, low latency, and ultra reliable pervasive connectivity among next-
generation wireless networks such as Internet of Things (IoT) devices, machine-to-machine …

Secure mmWave communication using UAV-enabled relay and cooperative jammer

R Ma, W Yang, Y Zhang, J Liu, H Shi - IEEE Access, 2019 - ieeexplore.ieee.org
Communication assisted by unmanned aerial vehicles (UAVs) has been regarded as an
effective technique for reliability improvement in both military and civilian domains, whereas …

Full-duplex constant-envelope jamceiver and self-interference suppression by highpass filter: Experimental validation for Wi-Fi security

J Marin, M Bernhardt, T Riihonen - IEEE Journal on Selected …, 2023 - ieeexplore.ieee.org
Unauthorized access to data has been a recognized risk of wireless systems for many
decades. While security solutions in communications engineering have typically revolved …

Secrecy performance analysis of energy harvesting wireless sensor networks with a friendly jammer

TG Nguyen, C So-In, DB Ha - IEEE Access, 2017 - ieeexplore.ieee.org
The broadcast nature of energy harvesting wireless sensor networks (EH-WSNs) allows
sensor nodes (SNs) within the coverage range of a transmitter to capture its signals …

On pilot spoofing attack in massive MIMO systems: Detection and countermeasure

W Xu, C Yuan, S Xu, HQ Ngo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Massive MIMO systems are vulnerable to pilot spoofing attacks (PSAs) since the estimated
channel state information can be contaminated by the eavesdropping link, thus incurring …

5G device-to-device communication security and multipath routing solutions

A Celik, J Tetzner, K Sinha, J Matta - Applied Network Science, 2019 - Springer
Through direct communication, device-to-device (D2D) technology can increase the overall
throughput, enhance the coverage, and reduce the power consumption of cellular …

Security issues of low power wide area networks in the context of lora networks

D Basu, T Gu, P Mohapatra - arXiv preprint arXiv:2006.16554, 2020 - arxiv.org
Low Power Wide Area Networks (LPWAN) have been used to support low cost and mobile
bi-directional communications for the Internet of Things (IoT), smart city and a wide range of …

Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications

X Li, HN Dai, MK Shukla, D Li, H Xu, M Imran - Computer Standards & …, 2021 - Elsevier
The security vulnerabilities are becoming the major obstacle to prevent the wide adoption of
ultra-reliable and low latency communications (URLLC) in 5G and beyond communications …