A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C Xiao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …

Routing constraints in the device-to-device communication for beyond IoT 5G networks: a review

S Malathy, P Jayarajan, MHDN Hindia, V Tilwari… - Wireless …, 2021 - Springer
Routing is fundamental in any wireless network for path selection, which provides the most
effective way that legitimizes the data to be transmitted from a source to a destination device …

Incentive jamming-based secure routing in decentralized internet of things

Y Xu, J Liu, Y Shen, J Liu, X Jiang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
This article focuses on the secure routing problem in the decentralized Internet of Things
(IoT). We consider a typical decentralized IoT scenario composed of peer legitimate devices …

QoS-aware secure routing design for wireless networks with selfish jammers

Y Xu, J Liu, Y Shen, X Jiang, Y Ji… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper focuses on the QoS-aware secure routing design based on the physical layer
security technology for a multi-hop wireless network consisting of legitimate nodes …

Data compression and transmission techniques in wireless adhoc networks: a review

V Vidhya, M Madheswaran - … and Networking: Proceedings of IC-ICN 2021, 2022 - Springer
A Wireless ad hoc network (WANET) is a decentralized brand where all nodes compete in
routing by promoting data for supplementary nodes. This is arranged in a disaster region to …

Fractional chaos based-cryptosystem for generating encryption keys in Ad Hoc networks

R Montero-Canela, E Zambrano-Serrano… - Ad Hoc Networks, 2020 - Elsevier
Ad Hoc networks are considered essential elements of the Internet of Things (IoT), which is a
technological trend for innovative future applications. Since in IoT systems the devices are …

Link selection for security-QoS tradeoffs in buffer-aided relaying networks

J He, J Liu, Y Shen, X Jiang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This article investigates the secure communication in a two-hop cooperative wireless
network, where a buffer-aided relay helps forward data from the source to destination, and a …

Secure communication in non-geostationary orbit satellite systems: A physical layer security perspective

Y Xiao, J Liu, Y Shen, X Jiang, N Shiratori - IEEE Access, 2018 - ieeexplore.ieee.org
Satellite communication systems serve as an indispensable component of wireless
heterogeneous networks in 5G era for providing various critical civil and military …

A secure multi-hop relay node selection scheme based data transmission in wireless ad-hoc network via block chain

SN Mahapatra, BK Singh, V Kumar - Multimedia Tools and Applications, 2022 - Springer
In today's scenario, data transmission is established through the single or multi-hop relay
nodes in Wireless Ad-Hoc Networks (WANET). Traditional relay node selection techniques …

Buffer-aided relaying for two-hop secure communication with limited packet lifetime

J He, J Liu, Y Xu, X Jiang - 2019 IEEE 20th International …, 2019 - ieeexplore.ieee.org
A lot of works have been done to demonstrate that buffer-aided relaying can achieve a
significant performance gain in cooperative wireless networks. However, the additional …