On secure wireless communications for service oriented computing

Y Zhang, Y Shen, H Wang, Y Zhang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Service Oriented Computing (SOC) has initially developed for the Internet, but also identified
as an appealing computing paradigm for developing applications in distributed wireless …

On secure wireless communications for IoT under eavesdropper collusion

Y Zhang, Y Shen, H Wang, J Yong… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Wireless communication is one of the key technologies that actualize the Internet of Things
(IoT) concept into the real world. Understanding the security performance of wireless …

Secure wireless communications via cooperation

L Dong, Z Han, AP Petropulu… - 2008 46th Annual …, 2008 - ieeexplore.ieee.org
The feasibility of physical-layer-based security approaches for wireless communications in
the presence of one or more eavesdroppers is hampered by channel conditions. In this …

Security-reliability trade-off analysis for multiuser SIMO mixed RF/FSO relay networks with opportunistic user scheduling

AH Abd El-Malek, AM Salhab… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we study the performance of multiuser single-input multiple-output mixed radio
frequency (RF)/free space optical (FSO) relay network with opportunistic user scheduling …

Cooperative secure transmission by exploiting social ties in random networks

HM Wang, Y Xu, KW Huang, Z Han… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Social awareness and social ties are becoming increasingly popular with emerging mobile
and handheld devices. Social trust degree describing the strength of the social ties has …

SOQR: Secure optimal QoS routing in wireless ad hoc networks

Y Xu, J Liu, O Takahashi, N Shiratori… - 2017 IEEE Wireless …, 2017 - ieeexplore.ieee.org
This paper study the secure optimal QoS routing (SOQR) in wireless ad hoc networks
(WANETs) based on the physical layer security techniques. Specifically, we consider a multi …

The Secrecy Outage Probability for the th Closest Legitimate User in Stochastic Networks

J Bai, X Tao, J Xu, Q Cui - IEEE communications letters, 2014 - ieeexplore.ieee.org
Motivated by information-theoretic security, the Poisson model for secure connectivity in
stochastic networks has recently received great attention. Although several expressions for …

A game theoretic approach to eavesdropper cooperation in MISO wireless networks

JP Cho, YWP Hong, CCJ Kuo - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Information theoretic security, also called secrecy analysis, provides theoretical limit for
secret data transmission even in wireless networking environment, and it is more focused in …

[PDF][PDF] The Capacity Analysis in the Secure Cooperative Communication System.

JS Chen, CY Yang, MS Hwang - Int. J. Netw. Secur., 2017 - academia.edu
With the characteristic of spatial diversity and low cost, cooperative system is a tendency for
the future communications. In the wireless communication system, there exist degradation …

Achieving covertness and secrecy: The interplay between detection and eavesdropping attacks

H Wu, Y Zhang, Y Shen, X Jiang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
This article explores a new secure wireless communication scenario for the data collection
in the Internet of Things (IoT) where the physical layer security technology is applied to …