Low earth orbit satellite security and reliability: Issues, solutions, and the road ahead

P Yue, J An, J Zhang, J Ye, G Pan… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Low Earth Orbit (LEO) satellites undergo a period of rapid development driven by ever-
increasing user demands, reduced costs, and technological progress. Since there is a lack …

Securing internet of medical things with friendly-jamming schemes

X Li, HN Dai, Q Wang, M Imran, D Li… - Computer Communications, 2020 - Elsevier
Abstract The Internet of Medical Things (IoMT)-enabled e-healthcare can complement
traditional medical treatments in a flexible and convenient manner. However, security and …

Multi-antenna covert communications in random wireless networks

TX Zheng, HM Wang, DWK Ng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper studies multi-antenna-aided covert communications coexisting with randomly
located wardens and interferers, considering both centralized and distributed antenna …

Covert communication achieved by a greedy relay in wireless networks

J Hu, S Yan, X Zhou, F Shu, J Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Covert wireless communication aims to hide the very existence of wireless transmissions in
order to guarantee a strong security in wireless networks. In this paper, we examine the …

Secrecy rate analysis of UAV-enabled mmWave networks using Matérn hardcore point processes

Y Zhu, G Zheng, M Fitch - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as
an effective solution to provide large coverage and dynamic capacity for both military and …

Secure communications in millimeter wave ad hoc networks

Y Zhu, L Wang, KK Wong… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have
enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are …

Security-reliability tradeoff analysis for cooperative NOMA in cognitive radio networks

B Li, X Qi, K Huang, Z Fei, F Zhou… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper develops a tractable analysis framework to evaluate the reliability and security
performance of cooperative non-orthogonal multiple access (co-NOMA) in cognitive …

Analyzing random access collisions in massive IoT networks

N Jiang, Y Deng, A Nallanathan… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The cellular-based infrastructure is regarded as one of the potential solutions for massive
Internet of Things (mIoT), where the random access (RA) procedure is used for requesting …

[PDF][PDF] On the security of LEO satellite communication systems: Vulnerabilities, countermeasures, and future trends

P Yue, J An, J Zhang, G Pan, S Wang, P Xiao… - Authorea …, 2023 - techrxiv.org
On the Security of LEO Satellite Communication Systems: Vulnerabilities, Countermeasures,
and Future Trends Page 1 P osted on 11 Jan 2020 — CC-BY-NC-SA 4 — h ttps://doi.org/10.36227/techrx …

Random access analysis for massive IoT networks under a new spatio-temporal model: A stochastic geometry approach

N Jiang, Y Deng, X Kang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Massive Internet of Things (mIoT) has provided an auspicious opportunity to build powerful
and ubiquitous connections that face a plethora of new challenges, where cellular networks …