Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
A comprehensive survey on full-duplex communication: Current solutions, future trends, and open issues
M Mohammadi, Z Mobini… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Full-duplex (FD) communication is a potential game changer for future wireless networks. It
allows for simultaneous transmit and receive operations over the same frequency band, a …
allows for simultaneous transmit and receive operations over the same frequency band, a …
Deep learning for distributed optimization: Applications to wireless resource management
This paper studies a deep learning (DL) framework to solve distributed non-convex
constrained optimizations in wireless networks where multiple computing nodes …
constrained optimizations in wireless networks where multiple computing nodes …
Wireless information surveillance via proactive eavesdropping with spoofing relay
Wireless information surveillance, by which suspicious wireless communications are closely
monitored by legitimate agencies, is an integral part of national security. To enhance the …
monitored by legitimate agencies, is an integral part of national security. To enhance the …
Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey
The key principle of physical layer security (PLS) is to permit the secure transmission of
confidential data using efficient signal-processing techniques. Also, deep learning (DL) has …
confidential data using efficient signal-processing techniques. Also, deep learning (DL) has …
Surveillance and intervention of infrastructure-free mobile communications: A new wireless security paradigm
Conventional wireless security assumes wireless communications are legitimate, and aims
to protect them against malicious eavesdropping and jamming attacks. However, emerging …
to protect them against malicious eavesdropping and jamming attacks. However, emerging …
Energy efficient legitimate wireless surveillance of UAV communications
Unmanned aerial vehicles (UAVs) enhance connectivity and accessibility for civilian and
military applications. Criminals or terrorists can potentially use UAVs for committing crimes …
military applications. Criminals or terrorists can potentially use UAVs for committing crimes …
Multi-antenna wireless legitimate surveillance systems: Design and performance analysis
To improve national security, government agencies have long been committed to enforcing
powerful surveillance measures on suspicious individuals or communications. In this paper …
powerful surveillance measures on suspicious individuals or communications. In this paper …
Cell-free massive MIMO surveillance of multiple untrusted communication links
A cell-free massive multiple-input-multiple-output (CF-mMIMO) system is considered for
enhancing the monitoring performance of wireless surveillance, where a large number of …
enhancing the monitoring performance of wireless surveillance, where a large number of …
Proactive eavesdropping via jamming over short packet suspicious communications with finite blocklength
D Xu, H Zhu - IEEE Transactions on Communications, 2022 - ieeexplore.ieee.org
Short packet communications play key roles in the Internet-of-Things. Conventional
Shannon's coding theorem is not applicable for short packet communications, and the …
Shannon's coding theorem is not applicable for short packet communications, and the …