A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

Physical layer security in heterogeneous networks with jammer selection and full-duplex users

W Tang, S Feng, Y Ding, Y Liu - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
In this paper, we enhance physical layer security for downlink heterogeneous networks by
using friendly jammers and full-duplex users. The jammers are selected to transmit jamming …

Timeliness and Secrecy-Aware Uplink Data Aggregation for Large-Scale UAV-IoT Networks

Y Ma, K Liu, Y Liu, L Zhu - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Due to the inherent characteristics of system extensibility and implementation flexibility,
unmanned aerial vehicle (UAV)-assisted data aggregations will play an essential role in …

Joint cooperative beamforming and jamming for physical-layer security of decode-and-forward relay networks

H Guo, Z Yang, L Zhang, J Zhu, Y Zou - IEEE Access, 2017 - ieeexplore.ieee.org
This paper proposes a new joint cooperative beamforming and jamming (JCBJ) scheme for
improving the physical layer security of decode-and-forward wireless networks where a …

Improving secrecy performance of a wirelessly powered network

Z Chen, L Hadley, Z Ding, X Dai - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper considers the secrecy communication of a wirelessly powered network, where an
energy-constrained legitimate transmitter (Alice) sends message to a legitimate receiver …

The Stochastic Geometry Analyses of Cellular Networks With -Stable Self-Similarity

R Li, Z Zhao, Y Zhong, C Qi… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
To understand the spatial deployment of base stations (BSs) is the first step to analyze the
performance of cellular networks and further design efficient networking protocols. Poisson …

Secure beamforming for cooperative wireless-powered networks with partial CSI

H Guo, Z Yang, Y Zou, T Tsiftsis… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
In this paper, we investigate the physical layer security (PLS) of cooperative wireless-
powered networks where a source transmits confidential information to a destination with the …

Secrecy outage analysis in random wireless networks with antenna selection and user ordering

G Chen, JP Coon - IEEE Wireless Communications Letters, 2017 - ieeexplore.ieee.org
This letter investigates the secrecy outage probability in the downlink with ordered user
equipment (UE) based on two ordering metrics. UEs and independently acting …

Opportunistic access control for enhancing security in D2D-enabled cellular networks

Y Chen, X Ji, K Huang, B Li, X Kang - Science China Information Sciences, 2018 - Springer
In this paper, we investigate secure communication over cellular uplinks in device-to-device
(D2D)-enabled cellular networks. We consider a more general scenario, in which multiple …

Physical layer security in wireless networks with Ginibre point processes

HB Kong, P Wang, D Niyato… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we investigate wireless networks consisting of a legitimate transmitter (Alice), a
legitimate receiver (Bob), eavesdroppers (Eves), and friendly jammers. Two network …