A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

Physical-layer authentication for Internet of Things via WFRFT-based Gaussian tag embedding

N Zhang, X Fang, Y Wang, S Wu, H Wu… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is regarded as the fundamental platform for many emerging services,
such as smart city, smart home, and intelligent transportation systems. With ever-increasing …

Covert wireless communication in IoT network: From AWGN channel to THz band

Z Liu, J Liu, Y Zeng, J Ma - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Covert communication can prevent an adversary from knowing that a transmission has
occurred between two users. In this article, we consider covert wireless communications in …

WFRFT-aided power-efficient multi-beam directional modulation schemes based on frequency diverse array

Q Cheng, V Fusco, J Zhu, S Wang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The artificial noise (AN) aided multi-beam directional modulation (DM) technology is
capable of wireless physical layer secure (PLS) transmissions for multiple desired receivers …

On countermeasures of pilot spoofing attack in massive MIMO systems: A double channel training based approach

W Wang, N Cheng, KC Teh, X Lin… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In this paper, we investigate secure communication in a massive multiple-input multiple-
output (MIMO) system with multiple users and multiple eavesdroppers (Eve) under both pilot …

An LDPC code based physical layer message authentication scheme with prefect security

D Chen, N Zhang, R Lu, X Fang… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
In this paper, we study physical layer message authentication with perfect security for
wireless networks, regardless of the computational power of adversaries. Specifically, we …

Toward physical layer security and efficiency for SAGIN: A WFRFT-based parallel complex-valued spectrum spreading approach

X Fang, Z Du, X Yin, L Liu, X Sha… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Space-air-ground integrated network (SAGIN), as an integration of interconnected space,
air, and ground network segments, is expected to see prevalent usage as part of intelligent …

BER analysis of WFRFT precoded OFDM and GFDM waveforms with an integer time offset

Z Wang, L Mei, X Sha… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we investigate bit error rate (BER) performances of weighted-type fractional
Fourier transform (WFRFT) precoded orthogonal frequency-division multiplexing (OFDM) …

Combating adversarial network topology inference by proactive topology obfuscation

T Hou, T Wang, Z Lu, Y Liu - IEEE/ACM Transactions on …, 2021 - ieeexplore.ieee.org
The topology of a network is fundamental for building network infrastructure functionalities.
In many scenarios, enterprise networks may have no desire to disclose their topology …

Performance analysis of secure communications over dual correlated Rician fading channels

KN Le - IEEE Transactions on Communications, 2018 - ieeexplore.ieee.org
Wireless secrecy under dual correlated Rician fading environments is theoretically studied
for correlated source-destination and source-wiretapper channels. Without considering …