A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Artificial-noise-aided secure transmission with directional modulation based on random frequency diverse arrays

J Hu, S Yan, F Shu, J Wang, J Li, Y Zhang - IEEE Access, 2017 - ieeexplore.ieee.org
In this paper, a random frequency diverse array-based directional modulation with artificial
noise (RFDA-DM-AN) scheme is proposed to enhance physical layer security of wireless …

RF energy harvesting wireless communications: RF environment, device hardware and practical issues

Y Luo, L Pu, G Wang, Y Zhao - Sensors, 2019 - mdpi.com
Radio frequency (RF) based wireless power transfer provides an attractive solution to
extend the lifetime of power-constrained wireless sensor networks. Through harvesting RF …

An overview of physical layer security in wireless communication systems with CSIT uncertainty

A Hyadi, Z Rezki, MS Alouini - IEEE Access, 2016 - ieeexplore.ieee.org
The concept of physical layer security builds on the pivotal idea of turning the channel's
imperfections, such as noise and fading, into a source of security. This is established …

Securing wireless communications of the internet of things from the physical layer, an overview

J Zhang, TQ Duong, R Woods, A Marshall - Entropy, 2017 - mdpi.com
The security of the Internet of Things (IoT) is receiving considerable interest as the low
power constraints and complexity features of many IoT devices are limiting the use of …

Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays

L Wang, Y Cai, Y Zou, W Yang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
We enhance the physical layer security (PLS) of amplify-and-forward (AF) relaying networks
with the aid of joint relay and jammer selection (JRJS), despite the deleterious effect of …

Intelligent reflecting surface aided pilot contamination attack and its countermeasure

KW Huang, HM Wang - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
Pilot contamination attack (PCA) in a time division duplex wireless communication system is
considered, where an eavesdropper (Eve) attacks the reverse pilot transmission phase in …

To harvest and jam: A paradigm of self-sustaining friendly jammers for secure AF relaying

H Xing, KK Wong, Z Chu… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
This paper studies the use of multi-antenna harvest-and-jam (HJ) helpers in a multi-antenna
amplify-and-forward (AF) relay wiretap channel assuming that the direct link between the …

UAV secure downlink NOMA transmissions: A secure users oriented perspective

HM Wang, X Zhang - IEEE Transactions on Communications, 2020 - ieeexplore.ieee.org
This paper proposes a secure downlink multi-user transmission scheme enabled by a
flexible unmanned aerial vehicle base station (UAV-BS) and non-orthogonal multiple access …