Robust secure beamforming design for two-user downlink MISO rate-splitting systems

H Fu, S Feng, W Tang, DWK Ng - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we consider max-min fairness for a downlink two-user multi-input single-output
(MISO) system with imperfect channel state information available at transmitter (CSIT) taking …

Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden

M Forouzesh, P Azmi, A Kuhestani… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In this article, we investigate joint information-theoretic secrecy and covert communication in
a single-input-multioutput (SIMO) system where a transmitter (Alice) is communicating with …

Physical layer security of in-home PLC systems: Analysis based on a measurement campaign

A Camponogara, HV Poor, MV Ribeiro - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
This article investigates the physical layer security (PLS) of a broadband in-home power line
communication (PLC) system when a malicious and passive PLC device tries to eavesdrop …

Physical layer detection of malicious relays in LTE-A network using unsupervised learning

Y Yengi, A Kavak, H Arslan - IEEE Access, 2020 - ieeexplore.ieee.org
For Long Term Evolution Advanced (LTE-A) network, although there exist many studies that
focus on improving the performance with relays, security issues are often neglected. Due to …

Malicious relay detection using sentinels: A stochastic geometry framework

U Tefek, A Tandon, TJ Lim - Journal of Communications and …, 2020 - ieeexplore.ieee.org
Next generation wireless networks are under high risk of security attacks due to increased
connectivity and information sharing among peer nodes. Some of the nodes could …

Attack detection for massive MIMO relay system

R Cao, Y Wan, H Yu, Y Lu, H Gao - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
This article focuses on a two-hop relay system, where a potential malicious single-antenna
relay may forward altered symbols to a base station (BS) equipped with massive antennas …

Guaranteeing Information Transfer Integrity Through Two Non-Colluding Malicious Nodes Against iid Attacks

X Zheng, R Cao, H Gao, Y Lu - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
This paper considers channel coding problems with the requirement of guaranteeing
information integrity in the presence of malicious relays (MRs). The proved random channel …