Transferable Physical Layer Authentication Based on Time-Varying Patterns Toward Zero Training Deployment for Mobile IIoT Devices

Q Wang, Z Pang, W Liang, J Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Physical layer authentication (PLA) is a promising approach to ensure wireless network
security. However, existing PLA algorithms require channel state information calibration and …

Security Transmission Scheme of NOMA Systems With an Untrusted Near User

E Li, R Wang, W Yang, A Dai… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Aiming at the serious threat of untrusted users to the system security in the non-orthogonal
multiple access (NOMA) downlink system, where an untrusted near user assists a far user to …

Secure Resource Allocation and Trajectory Design for UAV-Assisted IoT With Double Cluster Head

X Meng, X Wu, Z Xie, T Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) enable flexible data collection from Internet of Things
(IoT) nodes in remote areas, but the data of IoT nodes face security threats. In the proposed …

Sum Capacity Based Modeling and Secrecy Analysis of MISO-NOMA Cooperative IoT Framework

NU Zaman, K Munawar, M Moinuddin… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) has emerged as an effective technology, aiding in
latency reduction, improving security and reliability, and enhancing the spectral efficiency …