A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Secrecy performance of terrestrial radio links under collaborative aerial eavesdropping

X Yuan, Z Feng, W Ni, RP Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Motivated to understand the increasingly severe threat of unmanned aerial vehicles (UAVs)
to the confidentiality of terrestrial radio links, this paper analyzes the ergodic and E-outage …

Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks

Y Triwidyastuti, RHY Perdana, K Shim, B An - Sensors, 2023 - mdpi.com
Multihop transmission is one of the important techniques to overcome the transmission
coverage of each node in wireless sensor networks (WSNs). However, multihop …

Exploiting opportunistic scheduling schemes and wpt-based multi-hop transmissions to improve physical layer security in wireless sensor networks

K Shim, TV Nguyen, B An - Sensors, 2019 - mdpi.com
This paper studies the secrecy performance of wireless power transfer (WPT)-based multi-
hop transmissions in wireless sensors networks (WSNs), where legitimate nodes harvest …

Exploiting opportunistic scheduling schemes to improve physical-layer security in MU-MISO NOMA systems

K Shim, TV Nguyen, B An - IEEE Access, 2019 - ieeexplore.ieee.org
This paper studies opportunistic scheduling schemes to enhance the secrecy performance
in multi-user multiple-input single-output (MU-MISO) non-orthogonal multiple access …

A physical layer security-based transmit antenna selection scheme for NOMA systems

K Shim, H Oh, TN Do, B An - 2018 Tenth International …, 2018 - ieeexplore.ieee.org
In this paper, we propose a novel transmit antenna selection (TAS) scheme to improve the
physical layer security of two-user non-orthogonal multiple access (NOMA) systems …

Exploiting opportunistic scheduling for physical‐layer security in multitwo user NOMA networks

K Shim, B An - Wireless Communications and Mobile …, 2018 - Wiley Online Library
In this paper, we address the opportunistic scheduling in multitwo user NOMA system
consisting of one base station, multinear user, multifar user, and one eavesdropper. To …

[PDF][PDF] Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput.

SQ Ameen, FL Khaleel - International Journal of Electrical & …, 2018 - researchgate.net
Wireless Mesh Networks can be regarded as a type of communication technology in mesh
topology in which wireless nodes interconnect with one another. Wireless Mesh Networks …

On the secrecy outage probability and performance trade-off of the multi-hop cognitive relay networks

MN Pham - Telecommunication Systems, 2020 - Springer
We study the physical-layer security of multi-hop secondary network under spectrum sharing
constraint caused by the primary, which consists of many simultaneously independent direct …

A physical layer security-based routing protocol in mobile ad-hoc wireless networks

K Shim, TN Do, B An - 2018 20th International Conference on …, 2018 - ieeexplore.ieee.org
Physical layer security has been considered as a sustainable technique that is competitive
with existing cryptographic approaches to combat security attacks in the next generation …