A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

New trends in stochastic geometry for wireless networks: A tutorial and survey

Y Hmamouche, M Benjillali, S Saoudi… - Proceedings of the …, 2021 - ieeexplore.ieee.org
Next-generation wireless networks are expected to be highly heterogeneous, multilayered,
with embedded intelligence at both the core and edge of the network. In such a context …

Secrecy performance analysis of wireless communications in the presence of UAV jammer and randomly located UAV eavesdroppers

J Tang, G Chen, JP Coon - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have been undergoing fast development for providing
broader signal coverage and more extensive surveillance capabilities in military and civilian …

Achieving covert wireless communication with a multi-antenna relay

L Lv, Z Li, H Ding, N Al-Dhahir… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We investigate covert wireless communication in a multi-antenna relay network, where the
relay transmits its own covert message to the destination when assisting the source's …

Optimal routing for multihop social-based D2D communications in the Internet of Things

G Chen, J Tang, JP Coon - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
With the development of wireless communications and the intellectualization of machines,
the Internet of Things (IoT) has been of interest to both industry and academia. Multihop …

Safeguarding UAV IoT communication systems against randomly located eavesdroppers

H Lei, D Wang, KH Park, IS Ansari… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) will be extensively utilized in various Internet of Things
(IoT) scenarios due to their flexible mobility and rapid on-demand deployment. It becomes …

Enhancement of physical layer security with simultaneous beamforming and jamming for visible light communication systems

S Cho, G Chen, JP Coon - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
This paper considers physical layer security enhancement mechanisms that utilize
simultaneous beamforming and jamming in visible light communication systems with a …

Joint buffer-aided hybrid-duplex relay selection and power allocation for secure cognitive networks with double deep Q-network

C Huang, G Chen, Y Gong… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
This paper applies the reinforcement learning in the joint relay selection and power
allocation in the secure cognitive radio (CR) relay network, where the data buffers and full …

NB-IoT security: A survey

V Kumar, RK Jha, S Jain - Wireless Personal Communications, 2020 - Springer
In the past few years, the term Internet of Things (IoT) has become very prevalent. In IoT,
aggregation of data (from sensors) to processing the data (to the cloud) is energy constraint …

Securing visible light communication systems by beamforming in the presence of randomly distributed eavesdroppers

S Cho, G Chen, JP Coon - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
This paper considers secrecy enhancement mechanisms in visible light communication
(VLC) systems with spatially distributed passive eavesdroppers (EDs) under the assumption …