A survey of secure communications for satellite internet based on cryptography and physical layer security
Satellite internet serves as an indispensable component of the upcoming sixth‐generation
networks for providing global broadband internet access service. Due to the open nature of …
networks for providing global broadband internet access service. Due to the open nature of …
[HTML][HTML] Secrecy sum rate maximization for a MIMO-NOMA uplink transmission in 6G networks
Non-orthogonal multiple access (NOMA), as a well-qualified candidate for sixth-generation
(6G) mobile networks, has been attracting remarkable research interests due to high …
(6G) mobile networks, has been attracting remarkable research interests due to high …
Opportunistic Wiretapping/jamming: A new attack model in millimeter-wave wireless networks
Y Zhang, Z Zheng, J He, S Zhao, Q Qu… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
While the millimeter-wave (mmWave) communication is less susceptible against the
conventional wiretapping attack due to its short transmission range and directivity, this paper …
conventional wiretapping attack due to its short transmission range and directivity, this paper …
Reliable and secure short-packet communications in untrusted diamond relay networks
S Qian - IEEE Access, 2023 - ieeexplore.ieee.org
This paper investigates short-packet communications over a diamond relay network with two
untrusted relays (potential eavesdroppers) with the purpose of guaranteeing reliability and …
untrusted relays (potential eavesdroppers) with the purpose of guaranteeing reliability and …
Enhancing the Physical Layer Security of Two-Way Relay Systems With RIS and Beamforming
Y Zhang, S Zhao, Y Shen, X Jiang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper studies the possible physical layer security (PLS) enhancement in a wiretapped
two-way relay system from utilizing the reconfigurable intelligent surface (RIS) and …
two-way relay system from utilizing the reconfigurable intelligent surface (RIS) and …
[HTML][HTML] An Optimization Strategy for Security and Reliability in a Diamond Untrusted Relay Network with Cooperative Jamming
S Qian, M Cheng - Network, 2024 - mdpi.com
This paper tackles the challenge of secure and reliable data transmission in diamond
network configurations featuring two untrusted relays with low-security clearance. We …
network configurations featuring two untrusted relays with low-security clearance. We …
Hybrid Grey Wolf Optimization with Cuckoo Search‐based optimal channel estimation for energy efficient massive multiple input multiple output
G Indumathi, S Nisha Rani - International Journal of …, 2022 - Wiley Online Library
The massive multiple input multiple output (mMIMO) provides reliable base station (BS) for
the mobile users (MUs) with CSI (channel state information) and jointly offers spectral …
the mobile users (MUs) with CSI (channel state information) and jointly offers spectral …
Minimum secrecy rate maximization for multiple peer-to-peer communications in two-way relaying networks
M Cheraghi, Y Darmani - AEU-International Journal of Electronics and …, 2023 - Elsevier
We investigate physical layer security for multi-user peer-to-peer relay networks, where a
secure user pair and other unclassified users exchange information only through a multi …
secure user pair and other unclassified users exchange information only through a multi …
Low-Power Beamforming Design for Near-Field Integrated Sensing and Communication Networks
Z Cai, M Sheng, J Liu, J Liu, J Li - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Integrated Sensing and Communication (ISAC) has emerged as a cornerstone technology
for achieving seamless coverage in next-generation networks. Moreover, the advent of …
for achieving seamless coverage in next-generation networks. Moreover, the advent of …
Process-and-Forward two-way relay using multiple space-time line codes
In this paper, we consider a two-way relay (TWR) network that two source nodes (SNs) with
multiple antennas exchange data to each other via a relay node (RN) with multiple …
multiple antennas exchange data to each other via a relay node (RN) with multiple …