A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

Covert wireless communications under quasi-static fading with channel uncertainty

K Shahzad, X Zhou - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Covert communications enable a transmitter to send information reliably in the presence of
an adversary, who looks to detect whether the transmission took place or not. We consider …

Achieving covert communication in overlay cognitive radio networks

R Chen, Z Li, J Shi, L Yang, J Hu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we investigate the covert communications in an overlay cognitive radio (CR)
network, where multiple secondary transmitters (STs) opportunistically send confidential …

Security enhancement for energy harvesting cognitive networks with relay selection

K Ho-Van, T Do-Dac - Wireless Communications and Mobile …, 2020 - Wiley Online Library
Relay selection is proposed in this paper as an efficient solution to secure information
transmission of secondary users against eavesdroppers in energy harvesting cognitive …

Sum rate maximization of secure NOMA transmission with imperfect CSI

Z Li, S Wang, P Mu, YC Wu - ICC 2020-2020 IEEE International …, 2020 - ieeexplore.ieee.org
In multiple access systems, physical layer security is degraded since more attacking targets
are available for the eavesdropper. Fortunately, it has been recently demonstrated that non …

Probabilistic constrained secure transmissions: Variable-rate design and performance analysis

Z Li, S Wang, P Mu, YC Wu - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
In a wiretap channel, due to the passive nature of eavesdropper and the inevitable errors
during channel estimation or feedback, the channel state information is usually imperfectly …

Performance analysis for user scheduling in covert cognitive radio networks

R Chen, J Shi, L Yang, C Wang, Z Li… - 2020 IEEE 31st …, 2020 - ieeexplore.ieee.org
Covert communication provides high-level security for protecting users' privacy information.
In this paper, we analyze the joint impact of an external jammer and channel uncertainty on …

Secrecy under Rayleigh-dual correlated Rician fading employing opportunistic relays and an adaptive encoder

KN Le, VNQ Bao - IEEE Transactions on Vehicular Technology, 2020 - ieeexplore.ieee.org
Using a well-known wiretap model, for the first time in this paper, closed-form solutions are
achieved for wireless secrecy under dual correlated Rician fading. A novel wireless secrecy …

Performance of covert surveillance via proactive eavesdropping

S Tu, J Si, Z Cheng, L Guan… - … Conference on Wireless …, 2020 - ieeexplore.ieee.org
Surveillance performance is studied in this paper for a wireless eavesdropping system,
where a full-duplex legitimate monitor eavesdrops a suspicious link efficiently with the …

Security enhancement and evaluation for noise aggregation over wireless fading channels

Y Liu, Q Du - IEEE INFOCOM 2020-IEEE Conference on …, 2020 - ieeexplore.ieee.org
This paper studies the noise aggregation scheme with convolutional code in frequency-flat
block-fading channel. While there is still a lot of limitation in the noise aggregation scheme …