A review of physical layer security techniques for Internet of Things: Challenges and solutions

L Sun, Q Du - Entropy, 2018 - mdpi.com
With the uninterrupted revolution of communications technologies and the great-leap-
forward development of emerging applications, the ubiquitous deployment of Internet of …

Secure mobile edge computing networks in the presence of multiple eavesdroppers

X Lai, L Fan, X Lei, Y Deng… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this paper, we investigate a secure mobile edge computing (MEC) network in the
presence of multiple eavesdroppers, where multiple users can offload parts of their tasks to …

Opportunistic access point selection for mobile edge computing networks

J Xia, L Fan, N Yang, Y Deng, TQ Duong… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this paper, we investigate a mobile edge computing (MEC) network with two
computational access points (CAPs), where the source is equipped with multiple antennas …

Security-reliability trade-off analysis for rateless codes-based relaying protocols using NOMA, cooperative jamming and partial relay selection

DH Ha, TT Duy, PN Son, T Le-Tien, M Voznak - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, we propose secure relaying transmission protocols using rateless codes,
where a source sends encoded packets to two intended destinations via help of …

On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers

M Letafati, H Behroozi, BH Khalaj… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, a learning-aided content-based image transmission scheme is proposed,
where a multi-antenna source wishes to securely deliver an image to a legitimate …

Content-based medical image transmission against randomly-distributed passive eavesdroppers

M Letafati, H Behroozi, BH Khalaj… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
In this paper, a content-aware medical image transmission scheme is investigated over a
multiple-input single-output (MISO) channel in wireless healthcare systems. The multi …

Physical layer key generation from wireless channels with non-ideal channel reciprocity: A deep learning based approach

C Feng, L Sun - 2022 IEEE 95th Vehicular Technology …, 2022 - ieeexplore.ieee.org
Physical layer encryption is a promising solution to provide transmission security for Internet-
of-Things (IoT). To realize physical layer encryption, channel state information (CSI) as a …

Performance comparison between fountain codes-based secure MIMO protocols with and without using non-orthogonal multiple access

D The Hung, T Trung Duy, PT Tran, D Quoc Trinh… - Entropy, 2019 - mdpi.com
In this paper, we propose and evaluate the performance of fountain codes (FCs) based
secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in …

Rateless-code-based secure cooperative transmission scheme for industrial IoT

S Jain, R Bose - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Integrating the Internet-of-Things (IoT) paradigm with industrial wireless sensor networks
(IWSNs) has led to a technological evolution known as Industrial IoT (IIoT). To ensure …

Code-division space-time fountain code for plasma sheath communication

H Zhang, D Zhai - IEEE Access, 2024 - ieeexplore.ieee.org
Influenced by the special physical characteristics of the plasma sheath and the parameters
of the aircraft's attitude, the channel containing the plasma sheath can be regarded as a …