Performance Comparison of Relay-Based Covert Communications: DF, CF and AF

J Moon - Sensors, 2023 - mdpi.com
In this paper, we investigate the performance of covert communications in different types of a
relay system: decode-and-forward (DF), compress-and-forward (CF) and amplify-and …

Joint selection of FD/HD and AF/DF for covert communication in two-hop relay systems

Y Liu, H Wu, X Jiang - Ad Hoc Networks, 2023 - Elsevier
This paper focuses on the covert communication in a two-hop relay system consisting of a
transmitter, a relay, a receiver and a warden, where the relay can flexibly select between the …

[HTML][HTML] Covert communications in a compress-and-forward relay system

J Moon - ICT Express, 2024 - Elsevier
In this paper, we study covert communications strategies in a compress-and-forward (CF)
relay system. Along with a public message to a destination node via a CF relay, a source …

Reconfigurable Intelligent Surface-Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments

V Shahiri, H Behroozi, A Kuhestani… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Physical layer key generation (PLKG) can significantly enhance the security of classic
encryption schemes by efficiently providing secret keys in resource-limited network like the …

Timeliness and Secrecy-Aware Uplink Data Aggregation for Large-Scale UAV-IoT Networks

Y Ma, K Liu, Y Liu, L Zhu - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Due to the inherent characteristics of system extensibility and implementation flexibility,
unmanned aerial vehicle (UAV)-assisted data aggregations will play an essential role in …

DF-Relay-Assisted Multi-Antenna D2D Covert Communication in the Presence of Joint Detection

M Lin, C Liu, Q Wu, W Wang - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
This paper investigates the covert performance of the finite block length device-to-device
(D2D) transmission between the multi-antenna transceivers assisted by a decode-and …

Secret DMT Analysis for a Multiuser MIMO Fading Channel

A Roostaei, M Derakhtian - Wireless Personal Communications, 2024 - Springer
In wireless communications, eavesdropping is a threat due to the broadcast nature of the
channel. Therefore, in addition to the rate and the error probability, the secrecy level should …

Cooperative jamming aided securing wireless communications without CSI of eavesdroppers

K Yu, J Yu, Z Feng, M Guo - Computer Networks, 2023 - Elsevier
Physical layer security was designed as an effective solution to provide the security and
confidentiality of information transmission in wireless networks, and secrecy transmission …

[PDF][PDF] Physical layer key generation for UAV communication and measuring its resilience against passive and active attacks

M Keshavarzi, B Madadi, A Rahmanpour… - Aerospace Knowledge …, 2024 - astjournal.ir
The wireless communication of unmanned aerial vehicles (UAVs) has attracted a lot of
interest for reasons such as the possibility of high mobility, low-cost, deployment based on …