Covert communications hide the transmission of a message from a watchful adversary while ensuring a certain decoding performance at the receiver. In this paper, a wireless …
Covert wireless communication aims to hide the very existence of wireless transmissions in order to guarantee a strong security in wireless networks. In this paper, we examine the …
Due to the open nature of wireless communication systems, the data transmission over these networks are vulnerable to malicious attack. To safeguard the transmitted data …
Z Li, J Shi, C Wang, D Wang, X Li… - China …, 2023 - ieeexplore.ieee.org
Extensive research attentions have been devoted to studying cooperative cognitive radio networks (CCRNs), where secondary users (SU) providing cooperative transmissions can …
F Shu, X Wu, J Hu, J Li, R Chen… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
In this paper, a practical wireless transmission scheme is proposed to transmit confidential messages to the desired user securely and precisely by the joint use of multiple techniques …
In this work, we adopt channel inversion power control (CIPC) to achieve covert communications aided by a full-duplex receiver. Specifically, the transmitter varies the power …
Y Feng, S Yan, C Liu, Z Yang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we examine the physical layer security of a cooperative relay network where two source-destination pairs communicate through a decode-and-forward (DF) relay in the …
J Hu, S Yan, F Shu, J Wang - IEEE Transactions on Wireless …, 2019 - ieeexplore.ieee.org
This paper examines the possibility, performance limits, and associated costs for a self- sustained relay to transmit its own covert information to a destination on top of forwarding the …
Y Feng, S Yan, Z Yang, N Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we propose a novel beamforming design to enhance physical layer security of a non-orthogonal multiple access (NOMA) system with the aid of artificial noise (AN). The …