UAV-enabled secure communications: Joint trajectory and transmit power optimization

X Zhou, Q Wu, S Yan, F Shu, J Li - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper studies the physical layer security of an unmanned aerial vehicle (UAV) network,
where a UAV base station (UAV-B) transmits confidential information to multiple information …

Achieving covert wireless communications using a full-duplex receiver

K Shahzad, X Zhou, S Yan, J Hu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Covert communications hide the transmission of a message from a watchful adversary while
ensuring a certain decoding performance at the receiver. In this paper, a wireless …

Covert communication achieved by a greedy relay in wireless networks

J Hu, S Yan, X Zhou, F Shu, J Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Covert wireless communication aims to hide the very existence of wireless transmissions in
order to guarantee a strong security in wireless networks. In this paper, we examine the …

A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges

P Yadav, S Kumar, R Kumar - Transactions on Emerging …, 2021 - Wiley Online Library
Due to the open nature of wireless communication systems, the data transmission over
these networks are vulnerable to malicious attack. To safeguard the transmitted data …

Intelligent covert communication design for cooperative cognitive radio network

Z Li, J Shi, C Wang, D Wang, X Li… - China …, 2023 - ieeexplore.ieee.org
Extensive research attentions have been devoted to studying cooperative cognitive radio
networks (CCRNs), where secondary users (SU) providing cooperative transmissions can …

Secure and precise wireless transmission for random-subcarrier-selection-based directional modulation transmit antenna array

F Shu, X Wu, J Hu, J Li, R Chen… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
In this paper, a practical wireless transmission scheme is proposed to transmit confidential
messages to the desired user securely and precisely by the joint use of multiple techniques …

Covert wireless communications with channel inversion power control in Rayleigh fading

J Hu, S Yan, X Zhou, F Shu, J Li - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this work, we adopt channel inversion power control (CIPC) to achieve covert
communications aided by a full-duplex receiver. Specifically, the transmitter varies the power …

Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access

Y Feng, S Yan, C Liu, Z Yang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we examine the physical layer security of a cooperative relay network where
two source-destination pairs communicate through a decode-and-forward (DF) relay in the …

Covert transmission with a self-sustained relay

J Hu, S Yan, F Shu, J Wang - IEEE Transactions on Wireless …, 2019 - ieeexplore.ieee.org
This paper examines the possibility, performance limits, and associated costs for a self-
sustained relay to transmit its own covert information to a destination on top of forwarding the …

Beamforming design and power allocation for secure transmission with NOMA

Y Feng, S Yan, Z Yang, N Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we propose a novel beamforming design to enhance physical layer security of
a non-orthogonal multiple access (NOMA) system with the aid of artificial noise (AN). The …