[HTML][HTML] A survey of secure communications for satellite internet based on cryptography and physical layer security

Y Zhang, S Zhao, J He, Y Zhang, Y Shen… - IET Information …, 2023 - hindawi.com
Satellite internet serves as an indispensable component of the upcoming sixth-generation
networks for providing global broadband internet access service. Due to the open nature of …

[HTML][HTML] Secrecy sum rate maximization for a MIMO-NOMA uplink transmission in 6G networks

Y Dursun, K Wang, Z Ding - Physical Communication, 2022 - Elsevier
Non-orthogonal multiple access (NOMA), as a well-qualified candidate for sixth-generation
(6G) mobile networks, has been attracting remarkable research interests due to high …

Opportunistic Wiretapping/jamming: A new attack model in millimeter-wave wireless networks

Y Zhang, Z Zheng, J He, S Zhao, Q Qu… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
While the millimeter-wave (mmWave) communication is less susceptible against the
conventional wiretapping attack due to its short transmission range and directivity, this paper …

Reliable and secure short-packet communications in untrusted diamond relay networks

S Qian - IEEE Access, 2023 - ieeexplore.ieee.org
This paper investigates short-packet communications over a diamond relay network with two
untrusted relays (potential eavesdroppers) with the purpose of guaranteeing reliability and …

Hybrid Grey Wolf Optimization with Cuckoo Search‐based optimal channel estimation for energy efficient massive multiple input multiple output

G Indumathi, S Nisha Rani - International Journal of …, 2022 - Wiley Online Library
The massive multiple input multiple output (mMIMO) provides reliable base station (BS) for
the mobile users (MUs) with CSI (channel state information) and jointly offers spectral …

Minimum secrecy rate maximization for multiple peer-to-peer communications in two-way relaying networks

M Cheraghi, Y Darmani - AEU-International Journal of Electronics and …, 2023 - Elsevier
We investigate physical layer security for multi-user peer-to-peer relay networks, where a
secure user pair and other unclassified users exchange information only through a multi …

Physical layer security in untrusted diamond relay networks with imperfect source-relay links

S Qian, X He, X Zhou - 2022 International Symposium on …, 2022 - ieeexplore.ieee.org
A two-untrusted-relay transmission scheme is proposed with lossy-forward (LF) relaying
being utilized. Two untrusted relays are located between one source and one common …

Physical Layer Security in Untrusted Lossy Decode-and-Forward Relay Networks with Finite Blocklength

S Qian - 2023 IEEE 20th Consumer Communications & …, 2023 - ieeexplore.ieee.org
This paper investigates the physical layer security performance of an untrusted relay
network in the finite blocklength regime. Lossy decode-and-forward (DF) relaying is …

[PDF][PDF] Signal Processing Algorithms for MIMO-NOMA Based 6G Networks

Y Dursun - 2023 - pure.manchester.ac.uk
Increasing demand for both achieving higher data rate to solve computationally intensive
tasks timely and connecting more user equipment (UEs) simultaneously have prompted …

Process-and-Forward two-way relay using multiple space-time line codes

J Choi, J Joung - Signal Processing, 2022 - Elsevier
In this paper, we consider a two-way relay (TWR) network that two source nodes (SNs) with
multiple antennas exchange data to each other via a relay node (RN) with multiple …