A review of physical layer security techniques for Internet of Things: Challenges and solutions

L Sun, Q Du - Entropy, 2018 - mdpi.com
With the uninterrupted revolution of communications technologies and the great-leap-
forward development of emerging applications, the ubiquitous deployment of Internet of …

Physical layer security in cooperative AF relaying networks with direct links over mixed Rayleigh and double-Rayleigh fading channels

A Pandey, S Yadav - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of a dual-hop cooperative relaying
network, where a source node communicates with a destination node via an amplify-and …

Average secrecy outage rate and average secrecy outage duration of wireless communication systems with diversity over Nakagami-m fading channels

A Omri, MO Hasna - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
This paper presents an analytical methodology for the evaluation of two important physical
layer security metrics in wiretap channels. Specifically, we first introduce the concept and the …

Secure relay selection for two way amplify-and-forward untrusted relaying networks

T Mekkawy, R Yao, N Qi, Y Lu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Relay assisted communication helps to extend the transmission coverage area. In more
realistic scenarios, the available relays are untrusted, which try to decode the confidential …

Performance evaluation of amplify‐and‐forward relaying cooperative vehicular networks under physical layer security

A Pandey, S Yadav - Transactions on Emerging …, 2018 - Wiley Online Library
In this paper, we address the physical layer security of a cooperative vehicular network in
the presence of a passive eavesdropper vehicle, where the communication from a fixed …

Secrecy rate maximization for untrusted relay networks with nonorthogonal cooperative transmission protocols

W Jiang, Y Gong, Q Xiao, Y Liao - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, a relay based network is considered where the source transmits confidential
message to the destination via a nonregenerative relay. Due to the fact that the relay is …

Selective cooperation with untrusted relays for physical‐layer security in wireless multipair two‐way relaying networks

T Zhao, G Li, G Lyu, G Zhang - Transactions on Emerging …, 2018 - Wiley Online Library
In this paper, the selective cooperation with untrusted relays is studied for wireless multipair
two‐way relay networks. We first investigate the feasibility of secure transmission in the …

Symbol separation and beamforming to improve secure transmission in multi‐untrusted relay networks

T Mekkawy, R Yao, X Zuo, L Wang - Electronics Letters, 2018 - Wiley Online Library
In multi‐untrusted relay networks, the transmission should be carefully devised to guarantee
both security and performance. A novel scheme with symbol separation and beamforming is …

Design in power-domain NOMA: eavesdropping suppression in the two-user relay network with compensation for the relay user

D Xu, P Ren, Q Du, L Sun, Y Wang - Mobile Networks and Applications, 2018 - Springer
Non-orthogonal multiple access (NOMA) is becoming important in 5G, therefore, it is widely
researched. Note that the users served in NOMA are often paired to prevent excessive …

[PDF][PDF] Comprehensive Analysis of Secure Communication for Untrusted MISO Cognitive Radio Networks

N Ranjan, B Chourasia - IJRAR-International Journal of Research and …, 2018 - ijrar.org
The utilization of spectrum and secured communication in Cognitive radio network is big
issue. The cognitive radio network used unlicensed spectrum for the process of …