Securing wireless communications from the perspective of physical layer: A survey

Y Ji, J Yu, Y Yao, K Yu, H Chen, S Zheng - Internet of Things, 2022 - Elsevier
Ultra-reliability low-latency communication (uRLLC) is a new service category of the fifth-
generation (5G) mobile wireless networks, also plays a crucial role in the sixth-generation …

Multi-beam directional modulation synthesis scheme based on frequency diverse array

B Qiu, M Tao, L Wang, J Xie… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, a frequency diverse array-based directional modulation with artificial noise
synthesis scheme is proposed to enhance the physical layer security of wireless …

Decomposed and distributed directional modulation for secure wireless communication

B Qiu, W Cheng, W Zhang - IEEE Transactions on Wireless …, 2023 - ieeexplore.ieee.org
Directional modulation and artificial noise (AN)-based methods have been widely employed
to achieve physical-layer security (PLS). However, these approaches can only achieve …

Robust multi-beam secure mmwave wireless communication for hybrid wiretapping systems

B Qiu, W Cheng, W Zhang - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
In this paper, we consider the physical layer (PHY) security problem for hybrid wiretapping
wireless systems in millimeter wave transmission, where active eavesdroppers (AEs) and …

Design of the power and dimension of artificial noise for secure communication systems

H Yu, J Joung - IEEE Transactions on Communications, 2021 - ieeexplore.ieee.org
In this paper, the dimension of artificial noise (AN) and corresponding transmit power in
multiple-input multiple-output single-eavesdropper channels are investigated. It is widely …

[HTML][HTML] Physical-layer security improvement with reconfigurable intelligent surfaces for 6G wireless communication systems

J Youn, W Son, BC Jung - Sensors, 2021 - mdpi.com
Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both
academia and industry due to their flexibility and cost-effectiveness in adjusting the phase …

Privacy-Preserving State Estimation in the Presence of Eavesdroppers: A Survey

X Yan, G Zhou, DE Quevedo, C Murguia… - arXiv preprint arXiv …, 2024 - arxiv.org
Networked systems are increasingly the target of cyberattacks that exploit vulnerabilities
within digital communications, embedded hardware, and software. Arguably, the simplest …

Secure communication in relay-assisted massive MIMO downlink with active pilot attacks

D Kudathanthirige, S Timilsina… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, the achievable secrecy rate of a relay-assisted massive multiple-input multiple-
output (MIMO) downlink is investigated in the presence of a multi-antenna active/passive …

Secrecy outage analysis of CR-SWIPT networks with artificial noise and spatially random secondary terminals

Y Ma, T Lv, H Liu, T Li, J Zeng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, the secrecy outage performance of cognitive radio (CR) systems with
simultaneous wireless information and power transfer (SWIPT) is investigated, in which non …

Achievable secrecy rate region for buffer-aided multiuser MISO systems

X Lan, J Ren, Q Chen, L Cai - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we consider a buffer-aided multiuser multiple-input single-output (MISO)
network consisting of one multi-antenna access point (AP) and multiple single-antenna …