Security in energy harvesting networks: A survey of current solutions and research challenges

P Tedeschi, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The recent advancements in hardware miniaturization capabilities have boosted the
diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power …

I/Q imbalance aware nonlinear wireless-powered relaying of B5G networks: Security and reliability analysis

X Li, M Huang, Y Liu, VG Menon… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Physical layer security is known as a promising paradigm to ensure secure performance for
the future beyond 5G (B5G) networks. In light of this fact, this paper elaborates on a tractable …

Energy-aware multiuser scheduling for physical-layer security in energy-harvesting underlay cognitive radio systems

P Yan, Y Zou, J Zhu - IEEE Transactions on Vehicular …, 2017 - ieeexplore.ieee.org
In this paper, we consider an energy-harvesting underlay cognitive radio (CR) system, which
is comprised of multiple cognitive users (CUs), a common cognitive base station (CBS), and …

Secure communications in three-step two-way energy harvesting DF relaying

F Jameel, S Wyne, Z Ding - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
Energy harvesting relaying is predicted to play a pivotal role in large-scale energy
constrained networks. This letter evaluates the secrecy performance of a system that …

Reliability-security analysis for harvest-to-jam based multi-hop cluster MIMO networks using cooperative jamming methods under impact of hardware impairments

N Anh, N Minh, T Duy, T Hanh, H Hai - EAI Endorsed Transactions on …, 2021 - eudl.eu
In this paper, we consider harvest-to-jam based secure multi-hop cluster multi-input multi-
output networks, where a multi-antenna source sends its data to a multi-antenna destination …

Secrecy outage performance of multi-hop leach networks using power beacon aided cooperative jamming with jammer selection methods

HD Hung, TT Duy, M Voznak - AEU-International Journal of Electronics and …, 2020 - Elsevier
In this paper, we evaluate secrecy performance of cooperative jamming (CJ) aided secure
transmission for Multi-hop Low-Energy Adaptive Clustering Hierarchy (M-LEACH) networks …

Secure analysis of multi‐antenna cooperative networks with residual transceiver HIs and CEEs

X Li, M Huang, J Li, Q Yu, K Rabie… - IET …, 2019 - Wiley Online Library
This paper investigates the secure performance of multi‐antenna decode‐and‐forward (DF)
relaying networks where the Nakagami‐m fading channel is taken into account. In practice …

Physical layer security in two-way Swipt relay networks with imperfect CSI and a Friendly Jammer

M Hayajneh, TA Gulliver - Entropy, 2023 - mdpi.com
In this paper, the security of two-way relay communications in the presence of a passive
eavesdropper is investigated. Two users communicate via a relay that depends solely on …

Secrecy capacity in two-way energy harvesting relay networks with a friendly jammer

M Hayajneh, TA Gulliver - Wireless Networks, 2021 - Springer
This paper considers secure two-way relay communications in the presence of an
eavesdropper. Two users without a direct link between them communicate via an energy …

Energy harvesting for physical layer security in cooperative networks based on compressed sensing

S Chang, J Li, X Fu, L Zhang - Entropy, 2017 - mdpi.com
Energy harvesting (EH) has attracted a lot of attention in cooperative communication
networks studies for its capability of transferring energy from sources to relays. In this paper …