Outage-driven link selection for secure buffer-aided networks

D Wang, T He, F Zhou, J Cheng, R Zhang… - Science China Information …, 2022 - Springer
In this paper, we investigate secure communication in a two-hop wireless network, where
multiple buffer-aided relays assist to securely forward data from the sender to the destination …

Joint active and passive beamforming design for RIS-aided IBFD IoT communications: QoS and power efficiency considerations

K Singh, PC Wang, S Biswas, SK Singh… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
In a reconfigurable intelligent surface (RIS) aided communication network, a RIS equipped
with multiple passive reflecting elements assists in extending the coverage of wireless …

Security-reliability trade-off analysis for rateless codes-based relaying protocols using NOMA, cooperative jamming and partial relay selection

DH Ha, TT Duy, PN Son, T Le-Tien, M Voznak - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, we propose secure relaying transmission protocols using rateless codes,
where a source sends encoded packets to two intended destinations via help of …

Two birds with one stone: Simultaneous jamming and eavesdropping with the Bayesian-Stackelberg game

N Qi, W Wang, F Zhou, L Jia, Q Wu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In adversarial scenarios, it is crucial to timely monitor what tactical messages that opponent
transmitters are sending to intended receiver (s), and disrupt the transmissions immediately …

Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks

Y Triwidyastuti, RHY Perdana, K Shim, B An - Sensors, 2023 - mdpi.com
Multihop transmission is one of the important techniques to overcome the transmission
coverage of each node in wireless sensor networks (WSNs). However, multihop …

PHY Layer Anonymous Precoding: Sender Detection Performance and Diversity-Multiplexing Tradeoff

Z Wei, C Masouros, X Zhu, P Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Departing from traditional data security-oriented designs, the aim of anonymity is to conceal
the transmitters' identities during communications to all possible receivers. In this work, joint …

Physical-layer-based secure communications for static and low-latency industrial internet of things

Z Ji, PL Yeoh, G Chen, J Zhang… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
This article proposes a wireless key generation solution for secure low-latency
communications with active jamming attack prevention in wireless networked control …

[HTML][HTML] Overview of RIS-enabled secure transmission in 6G wireless networks

JS Bae, W Khalid, A Lee, H Lee, S Noh, H Yu - Digital Communications and …, 2024 - Elsevier
Abstract As the 6th-Generation (6G) wireless communication networks evolve, privacy
concerns are expected due to the transmission of vast amounts of security-sensitive private …

Overlay networks with jamming and energy harvesting: security analysis

K Ho-Van, T Do-Dac - Arabian Journal for Science and Engineering, 2021 - Springer
In cognitive radio networks, direct communications between a primary sender–recipient pair
may be blocked due to uncertainties such as deep fading. Therefore, this paper studies …

EviChain: A scalable blockchain for accountable intelligent surveillance systems

J Yu, H Chen, K Wu, T Zhou, Z Cai… - International Journal of …, 2022 - Wiley Online Library
Smart cameras, as typical IoT devices, are widely adopted to provide surveillance on
individuals, homes, and the environment. The unavoidably captured sensitive visuals via …