Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

Cooperation with an untrusted relay: A secrecy perspective

X He, A Yener - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
We consider the communication scenario where a source-destination pair wishes to keep
the information secret from a relay node despite wanting to enlist its help. For this scenario …

Physical layer security for two-way untrusted relaying with friendly jammers

R Zhang, L Song, Z Han, B Jiao - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
In this paper, we consider a two-way relay system where the two sources can only
communicate through an untrusted intermediate relay and investigate the physical layer …

Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens

M Forouzesh, P Azmi, A Kuhestani… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we address the problem of joint covert communication and secure
transmission in untrusted relaying networks when multiple wardens exist in the network. We …

Jamming-resilient frequency hopping-aided secure communication for Internet-of-Things in the presence of an untrusted relay

M Letafati, A Kuhestani, H Behroozi… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we propose a light-weight jamming-resistant scheme for the Internet-of-Things
(IoT) in 5G networks to ensure high-quality communication in a two-hop cooperative …

Secure communication via a wireless energy harvesting untrusted relay

SS Kalamkar, A Banerjee - IEEE Transactions on Vehicular …, 2016 - ieeexplore.ieee.org
The broadcast nature of the wireless medium allows unintended users to eavesdrop on
confidential information transmission. In this regard, we investigate the problem of secure …

Secure transmission with optimal power allocation in untrusted relay networks

L Wang, M Elkashlan, J Huang… - IEEE wireless …, 2014 - ieeexplore.ieee.org
We consider the problem of secure transmission in two-hop amplify-and-forward untrusted
relay networks. We analyze the ergodic secrecy capacity (ESC) and present compact …

On the physical layer security of untrusted millimeter wave relaying networks: A stochastic geometry approach

M Ragheb, SMS Hemami, A Kuhestani… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The physical layer security (PLS) of millimeter wave (mmWave) communication systems is
investigated, where the secure source-to-destination communication is assisted by an …