Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
A survey on multiple-antenna techniques for physical layer security
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …
widely recognized as a promising way to enhance wireless security by exploiting the …
A comprehensive survey on cooperative relaying and jamming strategies for physical layer security
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …
conventional cryptographic schemes for securing wireless links. Many studies have shown …
A survey of optimization approaches for wireless physical layer security
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …
increasing concerns from both academia and industry. The research on physical layer …
Optimal relay selection for physical-layer security in cooperative wireless networks
In this paper, we explore the physical-layer security in cooperative wireless networks with
multiple relays where both amplify-and-forward (AF) and decode-and-forward (DF) protocols …
multiple relays where both amplify-and-forward (AF) and decode-and-forward (DF) protocols …
Wireless physical-layer identification: Modeling and validation
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the
physical waveforms of wireless signals to identify and classify authorized devices. As the …
physical waveforms of wireless signals to identify and classify authorized devices. As the …
Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations
The Internet of Things (IoT) depicts a bright future, where any devices having sensorial and
computing capabilities can interact with each other. Among all existing technologies, the …
computing capabilities can interact with each other. Among all existing technologies, the …
Relay selection for security enhancement in cognitive relay networks
This letter proposes several relay selection policies for secure communication in cognitive
decode-and-forward relay networks, where a pair of cognitive relays is opportunistically …
decode-and-forward relay networks, where a pair of cognitive relays is opportunistically …
Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer
In this paper, we study different secrecy rate optimization techniques for a multiple-input–
multiple-output (MIMO) secrecy channel, where a multiantenna cooperative jammer is …
multiple-output (MIMO) secrecy channel, where a multiantenna cooperative jammer is …
Secure NOMA based two-way relay networks using artificial noise and full duplex
In this paper, we develop a non-orthogonal multiple access (NOMA)-based two-way relay
network with secrecy considerations, in which two users wish to exchange their NOMA …
network with secrecy considerations, in which two users wish to exchange their NOMA …