Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

A comprehensive survey on full-duplex communication: Current solutions, future trends, and open issues

M Mohammadi, Z Mobini… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Full-duplex (FD) communication is a potential game changer for future wireless networks. It
allows for simultaneous transmit and receive operations over the same frequency band, a …

Deep learning for distributed optimization: Applications to wireless resource management

H Lee, SH Lee, TQS Quek - IEEE Journal on Selected Areas in …, 2019 - ieeexplore.ieee.org
This paper studies a deep learning (DL) framework to solve distributed non-convex
constrained optimizations in wireless networks where multiple computing nodes …

Wireless information surveillance via proactive eavesdropping with spoofing relay

Y Zeng, R Zhang - IEEE Journal of Selected Topics in Signal …, 2016 - ieeexplore.ieee.org
Wireless information surveillance, by which suspicious wireless communications are closely
monitored by legitimate agencies, is an integral part of national security. To enhance the …

Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey

H Sharma, N Kumar - Physical Communication, 2023 - Elsevier
The key principle of physical layer security (PLS) is to permit the secure transmission of
confidential data using efficient signal-processing techniques. Also, deep learning (DL) has …

Surveillance and intervention of infrastructure-free mobile communications: A new wireless security paradigm

J Xu, L Duan, R Zhang - IEEE Wireless Communications, 2017 - ieeexplore.ieee.org
Conventional wireless security assumes wireless communications are legitimate, and aims
to protect them against malicious eavesdropping and jamming attacks. However, emerging …

Energy efficient legitimate wireless surveillance of UAV communications

K Li, RC Voicu, SS Kanhere, W Ni… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) enhance connectivity and accessibility for civilian and
military applications. Criminals or terrorists can potentially use UAVs for committing crimes …

Multi-antenna wireless legitimate surveillance systems: Design and performance analysis

C Zhong, X Jiang, F Qu, Z Zhang - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
To improve national security, government agencies have long been committed to enforcing
powerful surveillance measures on suspicious individuals or communications. In this paper …

Cell-free massive MIMO surveillance of multiple untrusted communication links

Z Mobini, HQ Ngo, M Matthaiou… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
A cell-free massive multiple-input-multiple-output (CF-mMIMO) system is considered for
enhancing the monitoring performance of wireless surveillance, where a large number of …

Proactive eavesdropping via jamming over short packet suspicious communications with finite blocklength

D Xu, H Zhu - IEEE Transactions on Communications, 2022 - ieeexplore.ieee.org
Short packet communications play key roles in the Internet-of-Things. Conventional
Shannon's coding theorem is not applicable for short packet communications, and the …