Covertness and secrecy study in untrusted relay-assisted D2D networks

R Sun, B Yang, Y Shen, X Jiang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article investigates the covertness and secrecy of wireless communications in an
untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base …

Secure transmission in wiretap channels using full-duplex relay-aided D2D communications with outdated CSI

MH Khoshafa, TMN Ngatched… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
This letter examines the physical layer security of a cellular network with inband underlay
relay-aided Device-to-Device (D2D) communication, considering the scenario where the …

Covert rate study for full-duplex D2D communications underlaid cellular networks

Y Yang, B Yang, S Shen, Y She… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Device-to-device (D2D) communications underlaid cellular networks have emerged as a
promising network architecture to provide extended coverage and high data rate for various …

Improving physical layer security of cellular networks using full-duplex jamming relay-aided D2D communications

MH Khoshafa, TMN Ngatched, MH Ahmed… - IEEE …, 2020 - ieeexplore.ieee.org
This paper investigates the physical layer security and data transmission in cellular networks
with inband underlay Device-to-Device (D2D) communications, where there is no direct link …

On the physical layer security of underlay relay-aided device-to-device communications

MH Khoshafa, TMN Ngatched… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we study the underlay relay-aided Device-to-Device (D2D) communications to
improve the physical layer (PHY) security of the cellular network. We propose a cooperative …

Covert communication in relay-assisted IoT systems

C Gao, B Yang, X Jiang, H Inamura… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) systems are of paramount importance to provide ubiquitous wireless
connectivity for smart cities. However, such systems are facing security challenges due to …

Securing large-scale d2d networks using covert communication and friendly jamming

S Feng, X Lu, S Sun, D Niyato… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We exploit both covert communication and friendly jamming to propose a friendly jamming-
assisted covert communication and use it to doubly secure a large-scale device-to-device …

Adaptive full-duplex jamming receiver for secure D2D links in random networks

HM Wang, BQ Zhao, TX Zheng - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Device-to-device (D2D) communication raises new transmission secrecy protection
challenges, since conventional physical layer security approaches, such as multiple …

RIS-aided physical layer security with full-duplex jamming in underlay D2D networks

W Khalid, H Yu, DT Do, Z Kaleem, S Noh - IEEE Access, 2021 - ieeexplore.ieee.org
This paper investigates the physical layer security and data transmission for the underlay
device-to-device (D2D) networks, and considers a combination of the reconfigurable …

D2D covert communications with safety area

H Rao, M Wu, J Wang, W Tang, S Xiao… - IEEE Systems …, 2020 - ieeexplore.ieee.org
In this article, we investigate device-to-device (D2D) relay enabled covert communications.
Safety zone is employed to isolate the eavesdroppers from the transmitters and receivers …