Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Toward improved offloading efficiency of data transmission in the IoT-cloud by leveraging secure truncating OFDM

M Jia, Z Yin, D Li, Q Guo, X Gu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Cloud computing provides powerful computing ability of mobile devices in the Internet of
Things (IoT) networks. However, the large amounts of data interaction with cloud suffers …

An efficient approach for device identification and traffic classification in IoT ecosystems

MRP Santos, RMC Andrade, DG Gomes… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Internet of Things arises as a computational paradigm that promotes the interconnection of
objects to the Internet and enables interaction, operational efficiency, and communication …

A novel physical layer security scheme in OFDM-based cognitive radio networks

HA Shah, I Koo - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, a physical-layer-security scheme for an underlay relay-based cognitive radio
network (CRN) that uses orthogonal frequency-division multiplexing (OFDM) as the medium …

Secrecy rate optimization for cooperative cognitive radio networks aided by a wireless energy harvesting jammer

X Chen, L Guo, X Li, C Dong, J Lin… - IEEE …, 2018 - ieeexplore.ieee.org
In this paper, a novel wireless energy harvesting cooperative jammer (EH-CJ)-aided
transmission scheme, which can enhance the security for cooperative cognitive radio …

Enhancing security of primary user in underlay cognitive radio networks with secondary user selection

M Qin, S Yang, H Deng, MH Lee - IEEE Access, 2018 - ieeexplore.ieee.org
This paper investigates the effect of multiuser gain provided by the secondary user selection
on the secrecy performance of the primary users. We first propose a simple scheme where …

Delay optimal opportunistic pipeline routing scheme for cognitive radio sensor networks

A Liu, W Chen, X Liu - International Journal of Distributed …, 2018 - journals.sagepub.com
In order to solve the problem of spectrum scarcity in wireless sensor networks, cognitive
radio technology can be introduced into wireless sensor networks, giving rising to cognitive …

A novel secure relay selection strategy for energy-harvesting-enabled Internet of things

Y Huo, M Xu, X Fan, T Jing - EURASIP Journal on Wireless …, 2018 - Springer
In this article, we focus on the problem of relay selection for the cooperative cognitive radio-
based Internet of things. In such systems, a pair of primary user devices (PUs) can only …

Passive localization of signal source based on wireless sensor network in the air

P Wan, Y Ni, B Hao, Z Li… - International Journal of …, 2018 - journals.sagepub.com
Passive localization of the wireless signal source attracts a considerable level of research
interest for its wide applications in modern wireless communication systems. To accurately …

Session-based cooperation in cognitive radio networks: A network-level approach

H Ding, C Zhang, X Li, J Liu, M Pan… - … /ACM Transactions on …, 2018 - ieeexplore.ieee.org
Currently, the cooperation-based spectrum access in cognitive radio networks (CRNs) is
implemented via cooperative communications based on link-level frame-based cooperative …