A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

A comprehensive survey on the cyber-security of smart grids: Cyber-attacks, detection, countermeasure techniques, and future directions

TT Khoei, HO Slimane, N Kaabouch - arXiv preprint arXiv:2207.07738, 2022 - arxiv.org
One of the significant challenges that smart grid networks face is cyber-security. Several
studies have been conducted to highlight those security challenges. However, the majority …

Security and privacy issues of UAV: A survey

Y Zhi, Z Fu, X Sun, J Yu - Mobile Networks and Applications, 2020 - Springer
The rapid development of the Unmanned Aerial Vehicle (UAV) brings much convenience to
our life. However, security and privacy problems caused by UAVs are gradually exposed …

Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer

DWK Ng, ES Lo, R Schober - IEEE transactions on vehicular …, 2015 - ieeexplore.ieee.org
In this paper, we study resource allocation for multiuser multiple-input-single-output
secondary communication systems with multiple system design objectives. We consider …

Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model

Y Liu, L Wang, SAR Zaidi, M Elkashlan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we investigate secure device-to-device (D2D) communication in energy
harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter …

On the design and implementation of a secure blockchain-based hybrid framework for Industrial Internet-of-Things

G Rathee, F Ahmad, R Sandhu, CA Kerrache… - Information Processing …, 2021 - Elsevier
Abstract Industrial Internet-of-Things (IIoT) refers to the next stage in the evolution of
organizations where collecting, analyzing, recording the data and controlling the entire …

Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- Channels

H Lei, C Gao, IS Ansari, Y Guo, Y Zou… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
This paper considers a multiple-input-multiple-output (MIMO) cognitive wiretap system over
Nakagami-m channels with generalized selection combining (GSC), where confidential …

Secrecy Performance Analysis of Cognitive Decode-and-Forward Relay Networks in Nakagami- Fading Channels

R Zhao, Y Yuan, L Fan, YC He - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
This paper investigates the physical layer security problem of cognitive decode-and-forward
relay networks over Nakagami-m fading channels. We consider the relaying communication …

Secure outage analysis of RIS-assisted communications with discrete phase control

W Shi, J Xu, W Xu, M Di Renzo… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This correspondence investigates a reconfigurable intelligent surface (RIS)-assisted
wireless communication system with security threats. The RIS is deployed to enhance the …

Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey

F Salahdine, N Kaabouch - Physical Communication, 2020 - Elsevier
Cyber-security threats and issues have been exponentially increasing over the last two
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …