Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions

F Irram, M Ali, M Naeem, S Mumtaz - Journal of Network and Computer …, 2022 - Elsevier
Physical layer security (PLS) has proven to be a potential solution for enhancing the security
performance of future 5G networks, which promises to fulfill the demands of increasing user …

Secrecy performance of cooperative cognitive AF relaying networks with direct links over mixed Rayleigh and double-Rayleigh fading channels

A Pandey, S Yadav, DT Do… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper investigates the secrecy performance of an underlay cooperative cognitive
relaying network, wherein a secondary source vehicle communicates with a fixed secondary …

Security-reliability trade-off analysis for rateless codes-based relaying protocols using NOMA, cooperative jamming and partial relay selection

DH Ha, TT Duy, PN Son, T Le-Tien, M Voznak - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, we propose secure relaying transmission protocols using rateless codes,
where a source sends encoded packets to two intended destinations via help of …

Joint Impact of Nodes Mobility and Imperfect Channel Estimates on the Secrecy Performance of Cognitive Radio Vehicular Networks Over Nakagami-m Fading …

A Pandey, S Yadav - IEEE Open Journal of Vehicular …, 2021 - ieeexplore.ieee.org
This paper investigates the joint impact of nodes' mobility and imperfect channel estimates
on the secrecy performance of an underlay cognitive radio vehicular network over Nakagami …

Multi-relay cognitive network with anti-fragile relay communication for intelligent transportation system under aggregated interference

B Ji, J Huang, Y Wang, K Song, C Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The rapid development and continuous innovation of wireless services have led to a boom
in the number and types of smart terminals. The huge amount of data that deep learning …

Model-based Bayesian reinforcement learning for enhancing primary user performance under jamming attack

AN Elbattrawy, AH Abd El-Malek, SI Rabia, WK Zahra - Ad Hoc Networks, 2023 - Elsevier
Due to the broadcast nature of wireless networks, jamming attacks are inevitable. Therefore,
this paper considers enhancing the throughput of a primary user (PU) suffering from a …

Optimal resource allocation for gaa users in spectrum access system using q-learning algorithm

W Abbass, R Hussain, J Frnda, IL Khan… - IEEE …, 2022 - ieeexplore.ieee.org
Spectrum access system (SAS) is a three-tier layered spectrum sharing architecture
proposed by the Federal Communications Commission (FCC) for Citizens Broadband Radio …

Intercept probability analysis of cooperative cognitive networks using fountain codes and cooperative jamming

TT Duy, NT Binh, NL Nhat - EAI Endorsed Transactions on …, 2021 - publications.eai.eu
This paper evaluates intercept probability (IP) of a cooperative cognitive radio network.
Using Fountain codes, a secondary source continuously generates encoded packets, and …

Proactive eavesdropping via jamming in NOMA network

TP Huu, H Tran, TX Quach, VN Dinh - IEEE Access, 2021 - ieeexplore.ieee.org
Recently, non-orthogonal multiple access (NOMA) has been considered as a promising
technique in 5G network, and many investigations have addressed on the physical layer …

Secrecy capacity results for a secure NOMA-based cognitive radio network with an external eavesdropper

KA Mehr, JM Niya, H Seyedarabi, SK Nobar - Physical Communication, 2020 - Elsevier
In this paper, we investigate a secure cognitive radio network (CRN), which deploys non-
orthogonal multiple access (NOMA) to deliver a mixed multicast and unicast traffic to the …