A survey on reconfigurable intelligent surface for physical layer security of next-generation wireless communications

R Kaur, B Bansal, S Majhi, S Jain… - IEEE Open Journal of …, 2024 - ieeexplore.ieee.org
Unprecedented growth in wireless data traffic, and ever-increasing demand for highly
secured, and low-latency wireless communication has motivated the research community to …

Security optimization for an AF MIMO two-way relay-assisted cognitive radio nonorthogonal multiple access networks with SWIPT

C Hu, Q Li, Q Zhang, J Qin - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
This paper investigates the physical layer security issue in an amplify-and-forward (AF) multi-
input multi-output (MIMO) two-way relay assisted cognitive radio (CR) nonorthogonal …

[HTML][HTML] Secrecy sum rate maximization for a MIMO-NOMA uplink transmission in 6G networks

Y Dursun, K Wang, Z Ding - Physical Communication, 2022 - Elsevier
Non-orthogonal multiple access (NOMA), as a well-qualified candidate for sixth-generation
(6G) mobile networks, has been attracting remarkable research interests due to high …

Physical-Layer Security of Underlay MIMO-D2D Communications by Null Steering Method Over Nakagami-m and Norton Fading Channels

A Kumar, S Majhi, HC Wu - IEEE Transactions on Wireless …, 2022 - ieeexplore.ieee.org
Underlay device-to-device (D2D) communication network is becoming a promising solution
for the fifth generation (5G) and beyond wireless technology. It exploits the proximity of the …

Latency Oriented Secure Wireless Federated Learning: A Channel-Sharing Approach with Artificial Jamming

T Wang, N Huang, Y Wu, J Gao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
As a promising framework for distributed machine learning (ML), wireless federated learning
(FL) faces the threat of eavesdropping attacks when a trained ML model is sent over a radio …

A Comprehensive Overview of Security and Privacy in the 6G Era

S Zaman, F Tariq, M Khandaker, RT Khan - 6G Wireless, 2023 - taylorfrancis.com
Cognitive security and privacy management are required to address the vulnerabilities of 6G
networks. This chapter demonstrates a brief discussion of various potential attacks/threats in …

Robust optimization of ris in terahertz under extreme molecular re-radiation manifestations

A Pradhan, MA Abd-Elmagid… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Terahertz (THz) communication signals are susceptible to severe degradation because of
the molecular interaction with the atmosphere in the form of subsequent absorption and re …

Time-frequency component-aware convolutional neural network for wireless interference classification

P Wang, Y Cheng, G Shang, J Wang… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
In wireless communication systems, wireless interference classification (WIC) is considered
as one of the most effective technologies to address the challenges brought by …

Covert Communication Against a Full-Duplex Adversary in Cognitive Radio Networks

J Yang, H Zhou, R Chen, J Shi… - GLOBECOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Covert communication is able to provide high-level security by protecting communication
behavior. In this paper, we develop a covert cooperative cognitive radio (CCCR) network …

Security Analysis of NOMA-FSO/RF Network Over Double Shadowed and Málaga- Channels

N Mensi, DB Rawat - GLOBECOM 2022-2022 IEEE Global …, 2022 - ieeexplore.ieee.org
In this paper, we aim at tackling the security performances of dual-hop mixed free-space
optical (FSO)/radio frequency (RF) cooperative with the non-orthogonal multiple access …