Securing internet of medical things with friendly-jamming schemes

X Li, HN Dai, Q Wang, M Imran, D Li… - Computer Communications, 2020 - Elsevier
Abstract The Internet of Medical Things (IoMT)-enabled e-healthcare can complement
traditional medical treatments in a flexible and convenient manner. However, security and …

Security in energy harvesting networks: A survey of current solutions and research challenges

P Tedeschi, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The recent advancements in hardware miniaturization capabilities have boosted the
diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power …

Impact of hardware impairment and co-channel interference on security-reliability trade-off for wireless sensor networks

B Li, Y Zou, J Zhu, W Cao - IEEE Transactions on Wireless …, 2021 - ieeexplore.ieee.org
In this paper, we investigate the security and reliability trade-off (SRT) for a wireless sensor
network (WSN) which consists of one cluster head (CH), multiple users, and one …

Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications

X Li, HN Dai, MK Shukla, D Li, H Xu, M Imran - Computer Standards & …, 2021 - Elsevier
The security vulnerabilities are becoming the major obstacle to prevent the wide adoption of
ultra-reliable and low latency communications (URLLC) in 5G and beyond communications …

Adaptive cooperative jamming for secure communication in energy harvesting relay networks

K Cao, B Wang, H Ding, J Tian - IEEE Wireless …, 2019 - ieeexplore.ieee.org
This letter studies the problem of secure communication for a dual-hop energy harvesting
(EH) relay network in the presence of multiple eavesdroppers. An adaptive cooperative …

Opportunistic relaying against eavesdropping for Internet-of-Things: A security-reliability tradeoff perspective

X Ding, Y Zou, F Ding, D Zhang… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
This paper investigates the physical-layer security (PLS) of wireless transmissions with the
aid of multiple decode-and-forward one-way relays in the presence of both eavesdropping …

Charge-then-cooperate: Secure resource allocation for wireless-powered relay networks with wireless energy transfer

M Wu, Q Song, L Guo… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This correspondence studies resource allocation for a wireless-powered relay network,
where a hybrid relay with constant energy supply assists an energy-constrained source to …

Impact of outdated CSI on the secrecy performance of wireless-powered untrusted relay networks

K Lee, JT Lim, HH Choi - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
We investigate the effect of outdated channel state information (CSI) on the secrecy
performance of wireless-powered untrusted relay networks, in which the relay is a potential …

Convexity analysis of nonlinear wireless power transfer with multiple RF sources

X Yuan, Y Hu, R Schober… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, the performance of nonlinear wireless power transfer (WPT) enabled by
multiple radio-frequency (RF) sources is characterized. The harvested power is modelled as …

Secrecy throughput maximization for full-duplex wireless powered IoT networks under fairness constraints

R Rezaei, S Sun, X Kang, YL Guan… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
In this paper, we study the secrecy throughput of a full-duplex wireless powered
communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full …