Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

Energy-efficient computation offloading for secure UAV-edge-computing systems

T Bai, J Wang, Y Ren, L Hanzo - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Characterized by their ease of deployment and bird's-eye view, unmanned aerial vehicles
(UAVs) may be widely deployed both in surveillance and traffic management. However, the …

A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Recent advances in cloud radio access networks: System architectures, key techniques, and open issues

M Peng, Y Sun, X Li, Z Mao… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a promising paradigm to reduce both capital and operating expenditures, the cloud radio
access network (C-RAN) has been shown to provide high spectral efficiency and energy …

Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT

F Zhou, Z Chu, H Sun, RQ Hu… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) have been deemed two
promising technologies due to their potential to achieve high spectral efficiency and massive …

Secure transmission in cognitive satellite terrestrial networks

K An, M Lin, J Ouyang, WP Zhu - IEEE Journal on Selected …, 2016 - ieeexplore.ieee.org
This paper investigates the physical layer security of a satellite network, whose downlink
spectral resource is shared with a terrestrial cellular network. We propose to employ a multi …

Toward practical quantum secure direct communication: A quantum-memory-free protocol and code design

Z Sun, L Song, Q Huang, L Yin, G Long… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Quantum secure direct communication (QSDC) is capable of direct confidential
communications over a quantum channel, which is achieved by dispensing with the key …

Cellular-base-station-assisted device-to-device communications in TV white space

G Ding, J Wang, Q Wu, YD Yao, F Song… - IEEE Journal on …, 2015 - ieeexplore.ieee.org
This paper presents a systematic approach to exploiting TV white space (TVWS) for device-
to-device (D2D) communications with the aid of the existing cellular infrastructure. The goal …

Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming

H Zhang, H Xing, J Cheng… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We consider secure resource allocations for orthogonal frequency division multiple access
(OFDMA) two-way relay wireless sensor networks (WSNs). The joint problem of subcarrier …