A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Security in energy harvesting networks: A survey of current solutions and research challenges

P Tedeschi, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The recent advancements in hardware miniaturization capabilities have boosted the
diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power …

I/Q imbalance aware nonlinear wireless-powered relaying of B5G networks: Security and reliability analysis

X Li, M Huang, Y Liu, VG Menon… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Physical layer security is known as a promising paradigm to ensure secure performance for
the future beyond 5G (B5G) networks. In light of this fact, this paper elaborates on a tractable …

Performance enhancement for energy harvesting based two-way relay protocols in wireless ad-hoc networks with partial and full relay selection methods

TN Nguyen, THQ Minh, PT Tran, M Voznak, TT Duy… - Ad hoc networks, 2019 - Elsevier
In this paper, we propose two relay selection methods to enhance system outage
performance for energy harvesting (EH) based two-way relaying protocols in wireless adhoc …

Wireless-powered two-way relaying protocols for optimizing physical layer security

K Lee, JP Hong, HH Choi… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper considers a two-way relay network, in which two sources exchange data through
a relay and a cooperative jammer transmits an artificial noise (AN) while a number of nearby …

Secrecy analysis and learning-based optimization of cooperative NOMA SWIPT systems

F Jameel, WU Khan, Z Chang… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) is considered to be one of the best candidates for
future networks due to its ability to serve multiple users using the same resource block …

Secrecy performance enhancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware …

P Tran Tin, D The Hung, TN Nguyen, TT Duy… - Entropy, 2019 - mdpi.com
In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay
cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit …

Achievable rate region of energy-harvesting based secure two-way buffer-aided relay networks

Y Nie, X Lan, Y Liu, Q Chen, G Chen… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper considered an energy-harvesting based secure two-way relay (EH-STWR)
network, where two users exchanged information with the assistance of one buffer-aided …

Wireless social networks: A survey of recent advances, applications and challenges

F Jameel, S Wyne, DNK Jayakody, G Kaddoum… - IEEE …, 2018 - ieeexplore.ieee.org
With the ubiquitous use of smartphones and other connected pieces of equipment, the
number of devices connected to the Internet is exponentially growing. This will test the …

On quantization for secret key generation from wireless channel samples

M Adil, S Wyne, SJ Nawaz - IEEE Access, 2021 - ieeexplore.ieee.org
Physical layer security (PLS) techniques hold promise for augmenting secure
communications in the 5 th generation of mobile wireless networks. Secret key generation …