A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Secrecy analysis of UAV-based mmWave relaying networks

X Pang, M Liu, N Zhao, Y Chen, Y Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Employing unmanned aerial vehicles (UAVs) in millimeter-wave (mmWave) networks as
relays has emerged as an appealing solution to assist remote or blocked communication …

Light-weight physical layer enhanced security schemes for 5G wireless networks

J Tang, H Wen, K Zeng, R Liao, F Pan, L Hu - IEEE Network, 2019 - ieeexplore.ieee.org
Due to the broadcast nature of wireless radio propagation channels, 5G wireless networks
face serious security threats. Security mechanisms that leverage physical layer …

Interference alignment for physical layer security in multi-user networks with passive eavesdroppers

L Hu, S Tan, H Wen, J Wu, J Fan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We investigate the physical layer security (PLS) in multi-user interference networks. In
particular, we consider secure transmission from a legitimate source (Alice) to a legitimate …

Physical‐Layer Channel Authentication for 5G via Machine Learning Algorithm

S Chen, H Wen, J Wu, J Chen, W Liu… - Wireless …, 2018 - Wiley Online Library
By utilizing the radio channel information to detect spoofing attacks, channel based physical
layer (PHY‐layer) enhanced authentication can be exploited in light‐weight securing 5G …

Secure transmission in NOMA-aided multiuser visible light communication broadcasting network with cooperative precoding design

G Shi, S Aboagye, TMN Ngatched… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
In this paper, we study the secrecy performance of non-orthogonal multiple access (NOMA)
enabled visible light communication (VLC) broadcast channels in the presence of an active …

Radio frequency fingerprint-based intelligent mobile edge computing for internet of things authentication

S Chen, H Wen, J Wu, A Xu, Y Jiang, H Song, Y Chen - Sensors, 2019 - mdpi.com
In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that
combines with a two-layer model is proposed to realize authentications for a large number of …

Power allocation for cooperative jamming against a strategic eavesdropper over parallel channels

Z Xu, M Baykal-Gürsoy - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
This paper considers a friendly interferer allocating jamming power to eavesdropping
channels to increase the level of secrecy of a wireless network. The friendly interferer has …

Securing the sensing functionality in ISAC networks: An artificial noise design

J Zou, C Masouros, F Liu, S Sun - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Integrated sensing and communications (ISAC) systems employ dual-functional signals to
simultaneously accomplish radar sensing and wireless communication tasks. However …

Cooperative jamming for secure transmission with both active and passive eavesdroppers

J Si, Z Cheng, Z Li, J Cheng, HM Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Secrecy transmission is investigated for a cooperative jamming scheme, where a multi-
antenna jammer generates artificial noise (AN) to confuse eavesdroppers. Two kinds of …