Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

Optimal relay selection for physical-layer security in cooperative wireless networks

Y Zou, X Wang, W Shen - IEEE journal on selected areas in …, 2013 - ieeexplore.ieee.org
In this paper, we explore the physical-layer security in cooperative wireless networks with
multiple relays where both amplify-and-forward (AF) and decode-and-forward (DF) protocols …

Wireless physical-layer identification: Modeling and validation

W Wang, Z Sun, S Piao, B Zhu… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the
physical waveforms of wireless signals to identify and classify authorized devices. As the …

Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations

Q Xu, P Ren, H Song, Q Du - IEEE Access, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) depicts a bright future, where any devices having sensorial and
computing capabilities can interact with each other. Among all existing technologies, the …

Relay selection for security enhancement in cognitive relay networks

Y Liu, L Wang, TT Duy, M Elkashlan… - IEEE wireless …, 2014 - ieeexplore.ieee.org
This letter proposes several relay selection policies for secure communication in cognitive
decode-and-forward relay networks, where a pair of cognitive relays is opportunistically …

Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer

Z Chu, K Cumanan, Z Ding, M Johnston… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we study different secrecy rate optimization techniques for a multiple-input–
multiple-output (MIMO) secrecy channel, where a multiantenna cooperative jammer is …

Secure NOMA based two-way relay networks using artificial noise and full duplex

B Zheng, M Wen, CX Wang, X Wang… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
In this paper, we develop a non-orthogonal multiple access (NOMA)-based two-way relay
network with secrecy considerations, in which two users wish to exchange their NOMA …