Robust secure beamforming design for two-user downlink MISO rate-splitting systems

H Fu, S Feng, W Tang, DWK Ng - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we consider max-min fairness for a downlink two-user multi-input single-output
(MISO) system with imperfect channel state information available at transmitter (CSIT) taking …

Secure transmission for SWIPT IoT systems with full-duplex IoT devices

D Xu, H Zhu - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
This article investigates physical layer security of a downlink multiuser orthogonal frequency
division multiplexing (OFDM) Internet of Things (IoT) system with an access point …

Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden

M Forouzesh, P Azmi, A Kuhestani… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In this article, we investigate joint information-theoretic secrecy and covert communication in
a single-input-multioutput (SIMO) system where a transmitter (Alice) is communicating with …

Robust beamforming and jamming for enhancing the physical layer security of full duplex radios

Z Kong, S Yang, D Wang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we investigate the physical layer security of a full-duplex base station (BS)-
aided system in the worst case, where an uplink transmitter (UT) and a downlink receiver …

Physical layer security of in-home PLC systems: Analysis based on a measurement campaign

A Camponogara, HV Poor, MV Ribeiro - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
This article investigates the physical layer security (PLS) of a broadband in-home power line
communication (PLC) system when a malicious and passive PLC device tries to eavesdrop …

Pilot spoofing detection for massive MIMO mmWave communication systems with a cooperative relay

S Wang, X Fu, R Ruby, Z Li - Computer Communications, 2023 - Elsevier
In massive millimeter-wave (mmWave) multiple-input–multiple-output (MIMO) systems,
eavesdroppers may transmit the identical pilot sequences as legitimate users to manipulate …

Secure communication using interference cancellation against multiple jammers

CDT Thai, VNQ Bao, NS Vo - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
In the area of physical-layer security for wireless communications, jamming is one of the
methods that a malicious agent uses to actively attack legitimate nodes. The jammers make …

Beamforming and jamming for physical-layer security with different trust degrees

CDT Thai - AEU-International Journal of Electronics and …, 2021 - Elsevier
In this paper, a network with multiple-antenna legitimate nodes and single-antenna
illegitimate nodes (INs) with different trust degrees (TD), such as trusted cooperative …

Malicious relay node detection with unsupervised learning in amplify-forward cooperative networks

Y Yengi, A Kavak, H Arslan, K Küçük… - … on Innovation and …, 2019 - ieeexplore.ieee.org
This paper presents malicious relay node detection in a cooperative network using
unsupervised learning based on the received signal samples over the source to destination …

Physical layer detection of malicious relays in LTE-A network using unsupervised learning

Y Yengi, A Kavak, H Arslan - IEEE Access, 2020 - ieeexplore.ieee.org
For Long Term Evolution Advanced (LTE-A) network, although there exist many studies that
focus on improving the performance with relays, security issues are often neglected. Due to …