Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

Robust beamforming designs in secure MIMO SWIPT IoT networks with a nonlinear channel model

Z Zhu, N Wang, W Hao, Z Wang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In this article, we study a robust beamforming design for multiuser multiple-input–multiple-
output secrecy networks with simultaneous wireless information and power transfer (SWIPT) …

A survey on multiuser SWIPT communications for 5G+

S Özyurt, AF Coşkun, S Büyükçorak, GK Kurt… - IEEE …, 2022 - ieeexplore.ieee.org
Increasing number of devices connected to the networks, applications and demands of new
generation wireless communications cause very high energy consumption resulting in large …

Improving data confidentiality in chirp spread spectrum modulation

FA Taha, S Althunibat - 2021 IEEE 26th International Workshop …, 2021 - ieeexplore.ieee.org
Chirp Spread Spectrum (CSS) modulation has shown a promising error performance
especially under very low signal-to-noise ratio conditions. Thus, it has been adopted as the …

MmWave technology and Terahertz technology IoT communications

Z Zhua, X Lib, W Haoa - Intelligent Sensing and Communications …, 2022 - books.google.com
The fifth generation (5G) wireless systems are expected to meet an continuously increasing
demand for wireless applications such as wide radio coverage and high data rate [1]. Due to …

A Secure and Trustable Access Method of Power Business in 5G Networks

H Li, F Meng, D Wang, Z Yang - International Conference on Simulation …, 2020 - Springer
The 5G power network has gradually adopted mobile terminal access to access the network
to manage business. With the continuous expansion of access terminal scale, if the attacker …