Physical layer security for NOMA systems: Requirements, issues, and recommendations

S Pakravan, JY Chouinard, X Li, M Zeng… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Nonorthogonal multiple access (NOMA) has been viewed as a potential candidate for the
upcoming generation of wireless communication systems. Comparing to traditional …

Enhancing PHY-security of FD-enabled NOMA systems using jamming and user selection: Performance analysis and DNN evaluation

K Shim, TN Do, TV Nguyen… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
In this article, we study the physical-layer security (PHY-security) improvement method for a
downlink nonorthogonal multiple access (NOMA) system in the presence of an active …

Security and reliability analysis of a two-way half-duplex wireless relaying network using partial relay selection and hybrid TPSR energy harvesting at relay nodes

DH Ha, TN Nguyen, MHQ Tran, X Li, PT Tran… - IEEE …, 2020 - ieeexplore.ieee.org
In recent years, physical layer security has been considered as an effective method to
enhance the information security beside the cryptographic techniques that are used in upper …

Robust multi-beam secure mmwave wireless communication for hybrid wiretapping systems

B Qiu, W Cheng, W Zhang - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
In this paper, we consider the physical layer (PHY) security problem for hybrid wiretapping
wireless systems in millimeter wave transmission, where active eavesdroppers (AEs) and …

Two birds with one stone: Simultaneous jamming and eavesdropping with the Bayesian-Stackelberg game

N Qi, W Wang, F Zhou, L Jia, Q Wu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In adversarial scenarios, it is crucial to timely monitor what tactical messages that opponent
transmitters are sending to intended receiver (s), and disrupt the transmissions immediately …

Partial-NOMA Based PLS: Following NOMA Decoding Principle or Enhanced Decoding Design?

B Zhuo, J Gu, W Duan, G Zhang, M Wen… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
In the insecure transmission environment, compared with the passive eavesdropper (Eve),
the active Eve plays a more threatening role in the physical layer security (PLS), since it can …

Active eavesdropping in short packet communication: Average secrecy throughput analysis

N Arı, N Thomos, L Musavian - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
In this paper, we investigate secure short packet transmission from a legitimate transmitter to
a receiver in the presence of an active eavesdropper. The aim is to gain more insights into …

Copula based analysis of impact of wireless channels correlation on the physical layer security performances in a wireless wiretap channel with artificial noise

S Pakravan, GA Hodtani - Transactions on Emerging …, 2022 - Wiley Online Library
In this article, a wireless wiretap channel with artificial noise assisted transmission and
active eavesdropper is considered, where, wireless channel coefficients are correlated …

Performance analysis of a MIMO system with bursty traffic in the presence of energy harvesting jammer

S Allipuram, P Mohapatra, N Pappas… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
This paper explores the role of multiple antennas in mitigating jamming attacks for the
Rayleigh fading environment with exogenous random traffic arrival. The jammer is assumed …

Analyzing secrecy outage in hybrid full-duplex attack while exploiting CSI of legitimate link

B Ahuja, D Mishra, R Bose - IEEE Wireless Communications …, 2021 - ieeexplore.ieee.org
The growing concern of secure communication becomes more challenging when
encountering a hybrid Full-duplex (FD) attacker possessing the dual capability to perform …