A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

A review of physical layer security techniques for Internet of Things: Challenges and solutions

L Sun, Q Du - Entropy, 2018 - mdpi.com
With the uninterrupted revolution of communications technologies and the great-leap-
forward development of emerging applications, the ubiquitous deployment of Internet of …

Secrecy performance analysis of UAV assisted relay transmission for cognitive network with energy harvesting

B Ji, Y Li, D Cao, C Li, S Mumtaz… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The unmanned aerial vehicle (UAV) assisted transmission can significantly improve the
spectrum efficiency and coverage of the wireless communication network. The paper …

On the uplink max–min SINR of cell-free massive MIMO systems

M Bashar, K Cumanan, AG Burr… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
A cell-free massive multiple-input multiple-output system is considered using a max-min
approach to maximize the minimum user rate with per-user power constraints. First, an …

Robust 3D-trajectory and time switching optimization for dual-UAV-enabled secure communications

W Wang, X Li, R Wang, K Cumanan… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This paper investigates a dual-unmanned aerial vehicle (UAV)-enabled secure
communication system, in which, a UAV moves around to send confidential messages to a …

Energy-constrained UAV-assisted secure communications with position optimization and cooperative jamming

W Wang, X Li, M Zhang, K Cumanan… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this paper, we consider an energy-constrained unmanned aerial vehicle (UAV)-enabled
mobile relay assisted secure communication system in the presence of a legitimate source …

Secrecy rate analysis of UAV-enabled mmWave networks using Matérn hardcore point processes

Y Zhu, G Zheng, M Fitch - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as
an effective solution to provide large coverage and dynamic capacity for both military and …

Energy-efficient cooperative secure transmission in multi-UAV-enabled wireless networks

M Hua, Y Wang, Q Wu, H Dai… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper investigates a multiple unmanned aerial vehicles (UAVs) enabled cooperative
secure transmission scheme in the presence of multiple potential eavesdroppers …

Joint trajectory design and resource allocation for secure transmission in cache-enabled UAV-relaying networks with D2D communications

J Ji, K Zhu, D Niyato, R Wang - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
With the exponential growth of data traffic, the use of caching and device-to-device (D2D)
communication has been recognized as an effective approach for mitigating the backhaul …

An overview of key technologies in physical layer security

A Sanenga, GA Mapunda, TML Jacob, L Marata… - Entropy, 2020 - mdpi.com
The open nature of radio propagation enables ubiquitous wireless communication. This
allows for seamless data transmission. However, unauthorized users may pose a threat to …