A review of physical layer security techniques for Internet of Things: Challenges and solutions

L Sun, Q Du - Entropy, 2018 - mdpi.com
With the uninterrupted revolution of communications technologies and the great-leap-
forward development of emerging applications, the ubiquitous deployment of Internet of …

Secure mobile edge computing networks in the presence of multiple eavesdroppers

X Lai, L Fan, X Lei, Y Deng… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this paper, we investigate a secure mobile edge computing (MEC) network in the
presence of multiple eavesdroppers, where multiple users can offload parts of their tasks to …

Secure cache-aided multi-relay networks in the presence of multiple eavesdroppers

J Xia, L Fan, W Xu, X Lei, X Chen… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In this paper, we investigate the security of a cache-aided multi-relay communication
network in the presence of multiple eavesdroppers, where each relay can pre-store a part of …

Opportunistic access point selection for mobile edge computing networks

J Xia, L Fan, N Yang, Y Deng, TQ Duong… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this paper, we investigate a mobile edge computing (MEC) network with two
computational access points (CAPs), where the source is equipped with multiple antennas …

Physical layer authenticated image encryption for IoT network based on biometric chaotic signature for MPFrFT OFDM system

EAA Hagras, S Aldosary, H Khaled, TM Hassan - Sensors, 2023 - mdpi.com
In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the
multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP …

Distributed secure switch-and-stay combining over correlated fading channels

X Lai, L Fan, X Lei, J Li, N Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we study decode-and-forward relaying networks in the presence of direct links,
where they are used by the eavesdropper to overhear the confidential message from the …

Symbol-level scheme for combating eavesdropping: Symbol conversion and constellation adjustment

D Xu, C Qiu, W Yin, P Zhao, M Cui - Computer Communications, 2025 - Elsevier
In the non-orthogonal multiple access scenario, users may suffer inter-multiuser
eavesdropping due to the feature of successive interference cancellation, and the conditions …

Key Exchange for Two-Way Untrusted Relaying Systems Through Constellation Overlapping

W Li, M Huang, X Lu - IEEE Communications Letters, 2024 - ieeexplore.ieee.org
This letter proposes a key exchange scheme for the untrusted relay system, where the relay
not only assists in message transmission but also tries to recover messages. Terminal users …

Wireless surveillance via proactive eavesdropping and rotated jamming

H Xu, L Sun - IEEE Transactions on Vehicular Technology, 2019 - ieeexplore.ieee.org
In this paper, we consider a wireless surveillance system, where two single-antenna
legitimate devices work cooperatively to monitor a suspicious link between a source (S) and …