A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Secrecy performance of small-cell networks with transmitter selection and unreliable backhaul under spectrum sharing environment

J Zhang, C Kundu, OA Dobre… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
We investigate the secrecy performance of an underlay small-cell cognitive radio network
under unreliable backhaul connections. The small-cell network shares the same spectrum …

Cooperative jammer placement for physical layer security enhancement

J Liu, Z Liu, Y Zeng, J Ma - IEEE Network, 2016 - ieeexplore.ieee.org
Wireless networks are increasingly being employed to transfer highly sensitive information.
Due to the broadcast nature of wireless channels, security issues have been taken as a …

Secure MIMO-SVD communications against eavesdroppers with any number of antennas

J Tang, H Wen, H Song, K Zeng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Physical layer security (PLS) provides strong and lightweight secure communications for
vehicle networks, which has attracted great attention. However, current schemes cannot …

Orthogonality-sabotaging attacks against OFDMA-based wireless networks

S Zhao, Z Lu, Z Luo, Y Liu - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
Wireless jamming remains as one of the primary threats towards wireless security.
Traditionally, jamming is able to disrupt wireless signals within, but not beyond, its covered …

Decomposed and Distributed Modulation to Achieve Secure Transmission

Z Li, S Le, J Chen, KG Shin, J Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the rapid deployment and wide use of mobile services and applications, more and
more sensitive user information is being transmitted wirelessly. Due to the broadcast nature …

Cooperative jamming for energy harvesting multicast networks with an untrusted relay

B He, J Chen, Y Kuo, L Yang - IET Communications, 2017 - Wiley Online Library
Recently, there are increasing requirements of security in wireless communications,
especially for the multiuser systems. In this study, the authors consider the security of two …

[HTML][HTML] SCIM: Incorporating secure communication and interference management in one operation

Z Li, P Lyu, J Li, Z Chang, J Liu, Z Yan - Digital Communications and …, 2023 - Elsevier
Due to the broadcast nature of wireless communications, users' data transmitted wirelessly
is susceptible to security/privacy threats. Meanwhile, as a result of the limitation of spectrum …

iCoding: Countermeasure against interference and eavesdropping in wireless communications

Z Li, Y Zhu, KG Shin - 2021 IEEE Global Communications …, 2021 - ieeexplore.ieee.org
With the rapid development of wireless communication technologies, interference
management (IM) and security/privacy in data transmission have become critically important …

Securing IoT uplink communications against eavesdropping

S Iellamo, R Guiazon, M Coupechoux… - … 3rd Cloudification of …, 2018 - ieeexplore.ieee.org
We consider a network of Internet of Things devices transmitting to an IoT Gateway (IoT-
GW). Such communications can potentially be overheard by one or multiple eavesdroppers …