On secure wireless communications for IoT under eavesdropper collusion

Y Zhang, Y Shen, H Wang, J Yong… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Wireless communication is one of the key technologies that actualize the Internet of Things
(IoT) concept into the real world. Understanding the security performance of wireless …

Interference exploitation in D2D-enabled cellular networks: A secrecy perspective

C Ma, J Liu, X Tian, H Yu, Y Cui… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Device-to-device (D2D) communication underlaying cellular networks is a promising
technology to improve network resource utilization. In D2D-enabled cellular networks …

Wireless social networks: A survey of recent advances, applications and challenges

F Jameel, S Wyne, DNK Jayakody, G Kaddoum… - IEEE …, 2018 - ieeexplore.ieee.org
With the ubiquitous use of smartphones and other connected pieces of equipment, the
number of devices connected to the Internet is exponentially growing. This will test the …

The impact of mobility on physical layer security of 5G IoT networks

K Yu, J Yu, C Luo - IEEE/ACM Transactions on Networking, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is rapidly spreading and reaching a multitude of different domains,
since the fifth generation (5G) wireless technologies are the key enablers of many IoT …

Application of full-duplex wireless technique into secure MIMO communication: Achievable secrecy rate based optimization

Y Zhou, ZZ Xiang, Y Zhu, Z Xue - IEEE Signal Processing …, 2014 - ieeexplore.ieee.org
This letter considers the secure MIMO transmission in a wireless environment, in which one
transmitter (Alice), one receiver (Bob) and one eavesdropper (Eve) are involved. Apart from …

Cooperative communication and mobility for securing URLLC of future wireless networks

K Yu, J Yu, A Dong - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
Ultra-reliable low-latency communication (uRLLC) emerges as one of the three service
categories in fifth-generation (5G) wireless networks, with a potential to support multiple …

Delay-aware optimization of physical layer security in multi-hop wireless body area networks

H Moosavi, FM Bui - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
Joint optimization of the physical layer security with end-to-end delay management is
studied in the uniquely constrained context of wireless body area networks (WBANs). A …

Secrecy-optimized resource allocation for device-to-device communication underlaying heterogeneous networks

K Zhang, M Peng, P Zhang, X Li - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Device-to-device (D2D) communications have recently attracted much attention for the
potential capability to improve spectral efficiency (SE) underlaying the existing …

On secure wireless communications for service oriented computing

Y Zhang, Y Shen, H Wang, Y Zhang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Service Oriented Computing (SOC) has initially developed for the Internet, but also identified
as an appealing computing paradigm for developing applications in distributed wireless …

Methods of improving secrecy transmission capacity in wireless random networks

K Yu, B Yan, J Yu, H Chen, A Dong - Ad Hoc Networks, 2021 - Elsevier
This paper analyzes the Secrecy Transmission Capacity (STC) over wireless networks,
where the legitimate nodes and eavesdroppers are distributed following Poisson point …