Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

[HTML][HTML] Survey on physical layer security for 5G wireless networks

JDV Sánchez, L Urquiza-Aguiar, MCP Paredes… - Annals of …, 2021 - Springer
Physical layer security is a promising approach that can benefit traditional encryption
methods. The idea of physical layer security is to take advantage of the propagation …

Achieving covert wireless communications using a full-duplex receiver

K Shahzad, X Zhou, S Yan, J Hu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Covert communications hide the transmission of a message from a watchful adversary while
ensuring a certain decoding performance at the receiver. In this paper, a wireless …

UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel

A Li, Q Wu, R Zhang - IEEE Wireless Communications Letters, 2018 - ieeexplore.ieee.org
This letter proposes a novel unmanned aerial vehicle (UAV)-enabled mobile jamming
scheme to improve the secrecy rate of ground wiretap channel. Specifically, a UAV is …

Energy-constrained UAV-assisted secure communications with position optimization and cooperative jamming

W Wang, X Li, M Zhang, K Cumanan… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this paper, we consider an energy-constrained unmanned aerial vehicle (UAV)-enabled
mobile relay assisted secure communication system in the presence of a legitimate source …

Secrecy rate analysis of UAV-enabled mmWave networks using Matérn hardcore point processes

Y Zhu, G Zheng, M Fitch - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as
an effective solution to provide large coverage and dynamic capacity for both military and …

[PDF][PDF] A survey on future generation wireless communications-5G: multiple access techniques, physical layer security, beamforming approach

KK Vaigandla, DN Venu - Journal of Information and …, 2021 - researchgate.net
In this paper, we summarize research initiatives for 5G wireless communication based on
advanced multiple access technologies. Earlier generations of cellular networks embraced …

Wireless communication, sensing, and REM: A security perspective

HM Furqan, MSJ Solaija, H Türkmen… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
The diverse requirements of next-generation communication systems necessitate
awareness, flexibility, and intelligence as essential building blocks of future wireless …

Beamforming techniques for nonorthogonal multiple access in 5G cellular networks

F Alavi, K Cumanan, Z Ding… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we develop various beamforming techniques for downlink transmission for
multiple-input single-output nonorthogonal multiple access (NOMA) systems. First, a …

Secure communications in tiered 5G wireless networks with cooperative jamming

Y Huo, X Fan, L Ma, X Cheng, Z Tian… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cooperative jamming is deemed as a promising physical layer-based approach to secure
wireless transmissions in the presence of eavesdroppers. In this paper, we investigate …