A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C Xiao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …

A Comprehensive Survey on Full-Duplex Communication: Current Solutions, Future Trends, and Open Issues

M Mohammadi, Z Mobini… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Full-duplex (FD) communication is a potential game changer for future wireless networks. It
allows for simultaneous transmit and receive operations over the same frequency band, a …

Autonomous vehicle: Security by design

A Chattopadhyay, KY Lam… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Security of (semi)-autonomous vehicles is a growing concern, first, due to the increased
exposure of the functionality to potential attackers; second, due to the reliance of …

Secure communications in NOMA system: Subcarrier assignment and power allocation

H Zhang, N Yang, K Long, M Pan… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Secure communication is a promising technology for wireless networks because it ensures
secure transmission of information. In this paper, we investigate the joint subcarrier (SC) …

Cell-free massive MIMO networks: Optimal power control against active eavesdropping

TM Hoang, HQ Ngo, TQ Duong… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
This paper studies the security aspect of a recently introduced “cell-free massive MIMO”
network under a pilot spoofing attack. First, a simple method to recognize the presence of …

IRS-aided energy-efficient secure WBAN transmission based on deep reinforcement learning

L Xiao, S Hong, S Xu, H Yang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Wireless body area networks (WBANs) are vulnerable to active eavesdropping that
simultaneously perform sniffing and jamming to raise the sensor transmit power, and thus …

Secure transmission for SWIPT IoT systems with full-duplex IoT devices

D Xu, H Zhu - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
This article investigates physical layer security of a downlink multiuser orthogonal frequency
division multiplexing (OFDM) Internet of Things (IoT) system with an access point …

Covert communication using null space and 3D beamforming: Uncertainty of Willie's location information

M Forouzesh, P Azmi, N Mokari… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Covert communication is often limited in rate because it is difficult to hide the signal in the
background noise. Recent work has shown that jamming can significantly improve the rate …

Caching and UAV friendly jamming for secure communications with active eavesdropping attacks

Y Zhou, PL Yeoh, C Pan, K Wang, Z Ma… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
In this paper, we discuss the security and reliability performance of a communication system,
where the base station (BS) transmits signals to multiple users and an unmanned aerial …