A comprehensive survey on full-duplex communication: Current solutions, future trends, and open issues

M Mohammadi, Z Mobini… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Full-duplex (FD) communication is a potential game changer for future wireless networks. It
allows for simultaneous transmit and receive operations over the same frequency band, a …

Securing internet of medical things with friendly-jamming schemes

X Li, HN Dai, Q Wang, M Imran, D Li… - Computer Communications, 2020 - Elsevier
Abstract The Internet of Medical Things (IoMT)-enabled e-healthcare can complement
traditional medical treatments in a flexible and convenient manner. However, security and …

Wireless powered cooperative jamming for secure OFDM system

G Zhang, J Xu, Q Wu, M Cui, X Li… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
This paper studies the secrecy communication in an orthogonal frequency division
multiplexing system, where a source sends confidential information to a destination in the …

Security in energy harvesting networks: A survey of current solutions and research challenges

P Tedeschi, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The recent advancements in hardware miniaturization capabilities have boosted the
diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power …

Power-efficient and secure WPCNs with hardware impairments and non-linear EH circuit

E Boshkovska, DWK Ng, L Dai… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we design a robust resource allocation algorithm for a wireless-powered
communication network (WPCN) taking into account residual hardware impairments (HWIs) …

Power allocation for secure SWIPT systems with wireless-powered cooperative jamming

M Liu, Y Liu - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
This letter considers wireless-powered cooperative jamming to secure communication
between a transmitter (Tx) and an information receiver, in the presence of an energy …

Full-duplex constant-envelope jamceiver and self-interference suppression by highpass filter: Experimental validation for Wi-Fi security

J Marin, M Bernhardt, T Riihonen - IEEE Journal on Selected …, 2023 - ieeexplore.ieee.org
Unauthorized access to data has been a recognized risk of wireless systems for many
decades. While security solutions in communications engineering have typically revolved …

Cooperative strategies for wireless-powered communications: An overview

H Chen, C Zhai, Y Li, B Vucetic - IEEE Wireless …, 2018 - ieeexplore.ieee.org
RF energy transfer and harvesting has been intensively studied recently as a promising
approach to significantly extend the lifetime of energy-constrained wireless networks. This …

Accumulate then transmit: Multiuser scheduling in full-duplex wireless-powered IoT systems

D Zhai, H Chen, Z Lin, Y Li… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
This paper develops and evaluates an accumulate-then-transmit framework for multiuser
scheduling in a full-duplex (FD) wireless-powered Internet-of-Things (IoT) system, consisting …

Adaptive wireless-powered relaying schemes with cooperative jamming for two-hop secure communication

K Lee, JP Hong, HH Choi… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
A two-hop relay network is considered, in which an eavesdropper can overhear the relaying
signal. To prevent the eavesdropper from decoding this signal, a destination transmits a …