Physical layer authentication in wireless communication networks: A survey

L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
Physical layer security (PLS) in wireless communication systems has attracted extensive
research attentions in recent years. Unlike cryptography-based methods applied in upper …

Physical-layer network coding: Tutorial, survey, and beyond

SC Liew, S Zhang, L Lu - Physical Communication, 2013 - Elsevier
The concept of physical-layer network coding (PNC) was proposed in 2006 for application in
wireless networks. Since then it has developed into a subfield of network coding with wide …

Frequency-domain RF self-interference cancellation for in-band full-duplex communications

ZH Hong, L Zhang, W Li, Y Wu, Z Zhu… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Wireless backhaul has recently gained a significant amount of interest as a cost-effective
solution in comparison with conventional backhaul technologies with dedicated microwave …

Overhearing protocol design exploiting intercell interference in cooperative green networks

C Li, S Zhang, P Liu, F Sun, JM Cioffi… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The conventional two-way relaying (TWR) protocol requires that the transmitter (receiver) in
one direction must be the receiver (transmitter) in the other direction, a limitation precluding …

Secure multiuser communications in multiple amplify-and-forward relay networks

L Fan, X Lei, TQ Duong, M Elkashlan… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
This paper proposes relay selection to increase the physical layer security in multiuser
cooperative relay networks with multiple amplify-and-forward relays, in the presence of …

Blind authentication at the physical layer under time-varying fading channels

N Xie, S Zhang - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
Authentication is a key requirement for secure communications in modern wireless systems.
Compared with the conventional authentication at the upper layer using a cryptographic tool …

Contract-based interference coordination in heterogeneous cloud radio access networks

M Peng, X Xie, Q Hu, J Zhang… - IEEE Journal on Selected …, 2015 - ieeexplore.ieee.org
Heterogeneous cloud radio access networks (H-CRANs) are potential solutions for
improving both spectral and energy efficiencies by embedding cloud computing into …

Survey on cooperative strategies for wireless relay channels

M Dai, P Wang, S Zhang, B Chen… - Transactions on …, 2014 - Wiley Online Library
Cooperative communication has the potential of providing better throughput and reliability to
wireless systems when compared with direct communication. To realise the potential gain, it …

Resource and trajectory optimization in UAV-powered wireless communication system

W Lu, P Si, F Lu, B Li, Z Liu, S Hu, Y Gong - Science China Information …, 2021 - Springer
The unmanned aerial vehicle (UAV) is a promising enabler of Internet of Things (IoT) owing
to its highly flexible features. Combined with wireless power transfer (WPT) techniques, a …

Comprehensive effects of imperfect synchronization and channel estimation on known interference cancellation

W Guo, C Li, H Zhao, R Wen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Known interference (KI) is commonly used in many scenarios, where the original
interference data is known to the receiver in advance. Unfortunately, due to the impacts of …