Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city

D Wang, B Bai, K Lei, W Zhao, Y Yang, Z Han - IEEE Access, 2019 - ieeexplore.ieee.org
Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC)
are believed as supporting technologies for building a smart city. The advancement and …

Beamforming design for physical layer security in a two-way cognitive radio IoT network with SWIPT

Z Deng, Q Li, Q Zhang, L Yang… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
In this article, we study the secure beamforming design for a two-way cognitive radio (CR)
Internet of Things (IoT) network aided with the simultaneous wireless information and power …

Interference-aware NOMA for cellular-connected UAVs: Stochastic geometry analysis

WK New, CY Leow, K Navaie, Y Sun… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
Efficiency of cellular-connected UAVs is challenged by spectrum inefficiency, limited number
of concurrent connectivity, and strong interference. To overcome these issues, in this paper …

[PDF][PDF] 非理想连续干扰消除下非正交多址接入上行传输系统性能分析

王夕予, 许晓明, 陈亚军 - 电子与信息学报, 2019 - jeit.ac.cn
非正交多址接入(NOMA) 技术允许多个发送方共用同一个资源块, 接收方通过连续干扰消除(SIC
) 解码出不同发送方的信息. 然而, 目前针对NOMA 系统的研究大多基于理想SIC 的假设 …

Security enhancement with a hybrid cooperative NOMA scheme for MEC system

B Li, W Wu, W Zhao, H Zhang - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
This article investigates how to exploit the cooperative mechanism between non-orthogonal
multiple access (NOMA) user pairs to enhance the security of the mobile-edge computing …

Physical layer security in large-scale random multiple access wireless sensor networks: a stochastic geometry approach

TX Zheng, X Chen, C Wang, KK Wong… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates physical layer security for a large-scale WSN with random multiple
access, where each fusion center in the network randomly schedules a number of sensors to …

Jamming-aided secrecy performance in secure uplink NOMA system

K Jiang, W Zhou, L Sun - IEEE access, 2020 - ieeexplore.ieee.org
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with
cooperative jammer (s) to improve secrecy performance is studied in this work. We first …

On NOMA-based mmWave communications

Y Tian, G Pan, MS Alouini - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) and millimeter-wave (mmWave) communication
are two promising techniques to increase the system capacity in the fifth-generation (5G) …

Analysis of different detection and mitigation algorithm of ddos attack in software-defined Internet of Things framework: A review

N Kumar, N Mittal, P Thakur, R Srivastava - Recent Trends and Advances …, 2020 - Springer
A decentralized type of network which senses the information from surrounding regions and
then forwards it to the base station is known as Internet of Things (IoT). With the increasing …