A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

Cooperative jamming for physical layer security enhancement in Internet of Things

L Hu, H Wen, B Wu, F Pan, RF Liao… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is becoming an emerging paradigm to achieve ubiquitous
connectivity, via massive deployment of physical objects, such as sensors, controllers, and …

Secure MISO-NOMA transmission with artificial noise

L Lv, Z Ding, Q Ni, J Chen - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
This correspondence studies a new secrecy beamforming (SBF) scheme for multiple-input
single-output non-orthogonal multiple access (MISO-NOMA) systems. In particular, the …

Safeguarding UAV communications against full-duplex active eavesdropper

C Liu, J Lee, TQS Quek - IEEE Transactions on Wireless …, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) wireless communication has recently been recognized to
be inevitable and prevalent in the fifth-generation (5G) wireless networks. In this paper, we …

Secure transmission designs for NOMA systems against internal and external eavesdropping

K Cao, B Wang, H Ding, T Li, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The key idea of non-orthogonal multiple access (NOMA) is to serve multiple users in the
same resource block to improve the spectral efficiency. Whereas due to the resource …

A secure multiuser privacy technique for wireless IoT networks using stochastic privacy optimization

JH Anajemba, T Yue, C Iwendi… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
With the exponential increase of interconnected communicating devices which make up the
Internet of Things (IoT), securing the network transmission and the fifth generation (5G) …

Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis

K Cumanan, GC Alexandropoulos… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
This paper studies the secrecy rate maximization problem of a secure wireless
communication system in the presence of multiple eavesdroppers. The security of the …

Artificial-noise-aided secure transmission in wiretap channels with transmitter-side correlation

S Yan, X Zhou, N Yang, B He… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
This paper, for the first time, examines the impact of transmitter-side correlation on the
artificial-noise (AN)-aided secure transmission, based on which a new power allocation …

Security provisioning for MISO vehicular relay networks via cooperative jamming and signal superposition

D Wang, P Ren, Q Du, L Sun… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We study the cooperative secure transmissions in (multiple-input signal-output) MISO
vehicular relay networks where the infrastructure node with multiple antennas sends two …

Cooperative secure communication in two-hop buffer-aided networks

D Wang, P Ren, J Cheng - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We propose two cooperative secure transmission schemes to protect a two-hop buffer-aided
network assisted by an energy harvesting relay. In the first scheme, we assume that the …