Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels

L Wang, N Yang, M Elkashlan… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
This paper advocates physical layer security of maximal ratio combining (MRC) in wiretap
two-wave with diffuse power fading channels. In such a wiretap channel, we consider that …

Secrecy rates in broadcast channels with confidential messages and external eavesdroppers

G Geraci, S Singh, JG Andrews, J Yuan… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we consider the broadcast channel with confidential messages and external
eavesdroppers (BCCE), where a multi-antenna base station simultaneously communicates …

Incentive jamming-based secure routing in decentralized internet of things

Y Xu, J Liu, Y Shen, J Liu, X Jiang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
This article focuses on the secure routing problem in the decentralized Internet of Things
(IoT). We consider a typical decentralized IoT scenario composed of peer legitimate devices …

Secrecy rate beamforming for multicell networks with information and energy harvesting

AA Nasir, HD Tuan, TQ Duong… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Considering a multicell network for the secure wireless information and power transfer, this
paper studies the joint design of transmit beamformers at the base stations (BSs) and …

Towards a unified framework for physical layer security in 5G and beyond networks

MSJ Solaija, H Salman, H Arslan - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Wireless systems have become an increasingly pivotal part of our lives. Various critical
applications and use cases such as healthcare, financial transactions, e-commerce …

Physical layer security jamming: Theoretical limits and practical designs in wireless networks

K Cumanan, H Xing, P Xu, G Zheng, X Dai… - IEEE …, 2016 - ieeexplore.ieee.org
Physical layer security has been recently recognized as a promising new design paradigm
to provide security in wireless networks. In addition to the existing conventional …

Exploiting adversarial jamming signals for energy harvesting in interference networks

J Guo, N Zhao, FR Yu, X Liu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Anti-jamming interference alignment (IA) is an effective method for battling adversarial
jammers for IA networks. Nevertheless, the number of antennas may not be enough to make …

RAV: Relay aided vectorized secure transmission in physical layer security for Internet of Things under active attacks

N Zhang, R Wu, S Yuan, C Yuan… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) security becomes of great importance, as IoT is the foundation for
many emerging services. To safeguard IoT security, cryptosystems at upper layer relying on …

Advances in visible light communication technologies and applications

Z Geng, FN Khan, X Guan, Y Dong - Photonics, 2022 - mdpi.com
With the development of light emitting diode (LED) lighting technology and its wide
applications, visible light communication (VLC) technology has also seen significant …

Blockchain for future wireless networks: A decade survey

T Rathod, NK Jadav, MD Alshehri, S Tanwar… - Sensors, 2022 - mdpi.com
The emerging need for high data rate, low latency, and high network capacity encourages
wireless networks (WNs) to build intelligent and dynamic services, such as intelligent …