A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Cooperative jamming for physical layer security enhancement in Internet of Things

L Hu, H Wen, B Wu, F Pan, RF Liao… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is becoming an emerging paradigm to achieve ubiquitous
connectivity, via massive deployment of physical objects, such as sensors, controllers, and …

Secure communications in NOMA system: Subcarrier assignment and power allocation

H Zhang, N Yang, K Long, M Pan… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Secure communication is a promising technology for wireless networks because it ensures
secure transmission of information. In this paper, we investigate the joint subcarrier (SC) …

Simultaneously transmitting and reflecting ris (STAR-RIS) assisted multi-antenna covert communication: Analysis and optimization

H Xiao, X Hu, P Mu, W Wang, TX Zheng… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
This paper investigates the multi-antenna covert communications assisted by a
simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS). In …

Cooperative-jamming-aided secrecy enhancement in wireless networks with passive eavesdroppers

L Hu, H Wen, B Wu, J Tang, F Pan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper investigates cooperative security in wireless networks, where a source (Alice)
intends to transmit a confidential message to a legitimate destination (Bob), with the help of …

STAR-RIS Enhanced Joint Physical Layer Security and Covert Communications for Multi-antenna mmWave Systems

H Xiao, X Hu, A Li, W Wang, Z Su… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper investigates the utilization of simultaneously transmitting and reflecting RIS
(STAR-RIS) in supporting joint physical layer security (PLS) and covert communications …

Physical layer security in large-scale random multiple access wireless sensor networks: a stochastic geometry approach

TX Zheng, X Chen, C Wang, KK Wong… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates physical layer security for a large-scale WSN with random multiple
access, where each fusion center in the network randomly schedules a number of sensors to …

Secure beamforming design in relay-assisted Internet of Things

P Huang, Y Hao, T Lv, J Xing, J Yang… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
A secure downlink transmission system which is exposed to multiple eavesdroppers and is
appropriate for Internet of Things (IoT) applications is considered. A worst case scenario is …

Charge-then-cooperate: Secure resource allocation for wireless-powered relay networks with wireless energy transfer

M Wu, Q Song, L Guo… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This correspondence studies resource allocation for a wireless-powered relay network,
where a hybrid relay with constant energy supply assists an energy-constrained source to …

Optimal access scheme for security provisioning of C-V2X computation offloading network with imperfect CSI

B Qiu, H Xiao, AT Chronopoulos, D Zhou… - IEEE Access, 2020 - ieeexplore.ieee.org
In a cellular vehicle-to-everything (C-V2X) enabled computation-offloading network,
vehicular users may deliver computation tasks to a cellular base station (BS) through vehicle …