A survey of secure communications for satellite internet based on cryptography and physical layer security

Y Zhang, S Zhao, J He, Y Zhang, Y Shen… - IET Information …, 2023 - Wiley Online Library
Satellite internet serves as an indispensable component of the upcoming sixth‐generation
networks for providing global broadband internet access service. Due to the open nature of …

[HTML][HTML] Secrecy sum rate maximization for a MIMO-NOMA uplink transmission in 6G networks

Y Dursun, K Wang, Z Ding - Physical Communication, 2022 - Elsevier
Non-orthogonal multiple access (NOMA), as a well-qualified candidate for sixth-generation
(6G) mobile networks, has been attracting remarkable research interests due to high …

Opportunistic Wiretapping/jamming: A new attack model in millimeter-wave wireless networks

Y Zhang, Z Zheng, J He, S Zhao, Q Qu… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
While the millimeter-wave (mmWave) communication is less susceptible against the
conventional wiretapping attack due to its short transmission range and directivity, this paper …

Reliable and secure short-packet communications in untrusted diamond relay networks

S Qian - IEEE Access, 2023 - ieeexplore.ieee.org
This paper investigates short-packet communications over a diamond relay network with two
untrusted relays (potential eavesdroppers) with the purpose of guaranteeing reliability and …

Enhancing the Physical Layer Security of Two-Way Relay Systems With RIS and Beamforming

Y Zhang, S Zhao, Y Shen, X Jiang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper studies the possible physical layer security (PLS) enhancement in a wiretapped
two-way relay system from utilizing the reconfigurable intelligent surface (RIS) and …

[HTML][HTML] An Optimization Strategy for Security and Reliability in a Diamond Untrusted Relay Network with Cooperative Jamming

S Qian, M Cheng - Network, 2024 - mdpi.com
This paper tackles the challenge of secure and reliable data transmission in diamond
network configurations featuring two untrusted relays with low-security clearance. We …

Hybrid Grey Wolf Optimization with Cuckoo Search‐based optimal channel estimation for energy efficient massive multiple input multiple output

G Indumathi, S Nisha Rani - International Journal of …, 2022 - Wiley Online Library
The massive multiple input multiple output (mMIMO) provides reliable base station (BS) for
the mobile users (MUs) with CSI (channel state information) and jointly offers spectral …

Minimum secrecy rate maximization for multiple peer-to-peer communications in two-way relaying networks

M Cheraghi, Y Darmani - AEU-International Journal of Electronics and …, 2023 - Elsevier
We investigate physical layer security for multi-user peer-to-peer relay networks, where a
secure user pair and other unclassified users exchange information only through a multi …

Low-Power Beamforming Design for Near-Field Integrated Sensing and Communication Networks

Z Cai, M Sheng, J Liu, J Liu, J Li - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Integrated Sensing and Communication (ISAC) has emerged as a cornerstone technology
for achieving seamless coverage in next-generation networks. Moreover, the advent of …

Process-and-Forward two-way relay using multiple space-time line codes

J Choi, J Joung - Signal Processing, 2022 - Elsevier
In this paper, we consider a two-way relay (TWR) network that two source nodes (SNs) with
multiple antennas exchange data to each other via a relay node (RN) with multiple …