Y Liu, H Wu, X Jiang - Ad Hoc Networks, 2023 - Elsevier
This paper focuses on the covert communication in a two-hop relay system consisting of a transmitter, a relay, a receiver and a warden, where the relay can flexibly select between the …
In this paper, we study covert communications strategies in a compress-and-forward (CF) relay system. Along with a public message to a destination node via a CF relay, a source …
V Shahiri, H Behroozi, A Kuhestani… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Physical layer key generation (PLKG) can significantly enhance the security of classic encryption schemes by efficiently providing secret keys in resource-limited network like the …
Y Ma, K Liu, Y Liu, L Zhu - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Due to the inherent characteristics of system extensibility and implementation flexibility, unmanned aerial vehicle (UAV)-assisted data aggregations will play an essential role in …
M Lin, C Liu, Q Wu, W Wang - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
This paper investigates the covert performance of the finite block length device-to-device (D2D) transmission between the multi-antenna transceivers assisted by a decode-and …
A Roostaei, M Derakhtian - Wireless Personal Communications, 2024 - Springer
In wireless communications, eavesdropping is a threat due to the broadcast nature of the channel. Therefore, in addition to the rate and the error probability, the secrecy level should …
K Yu, J Yu, Z Feng, M Guo - Computer Networks, 2023 - Elsevier
Physical layer security was designed as an effective solution to provide the security and confidentiality of information transmission in wireless networks, and secrecy transmission …
M Keshavarzi, B Madadi, A Rahmanpour… - Aerospace Knowledge …, 2024 - astjournal.ir
The wireless communication of unmanned aerial vehicles (UAVs) has attracted a lot of interest for reasons such as the possibility of high mobility, low-cost, deployment based on …