Securing OFDMA-Based Cooperative Vehicular IoT Systems From Untrusted Platooning Networks

R Zhao, D Mishra, A Seneviratne - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
As the Internet of Things (IoT) becomes more integrated with everyday life, Vehicle-to-
Vehicle (V2V) communication is becoming increasingly crucial for intelligent transportation …

Subcarrier pairing as channel gain tailoring: Joint resource allocation for relay-assisted secure OFDMA with untrusted users

R Saini, D Mishra, S De - Physical Communication, 2019 - Elsevier
Joint resource allocation involving optimization of subcarrier allocation, subcarrier pairing
(SCP), and power allocation in a cooperative secure orthogonal frequency division multiple …

Enhancing physical layer security in AF relay–assisted multicarrier wireless transmission

W Aman, GAS Sidhu, HM Furqan… - Transactions on …, 2018 - Wiley Online Library
In this paper, we study the physical layer security problem in the dual‐hop orthogonal
frequency division multiplexing–based wireless communication system. First, we consider a …

Secure resource allocation for cooperative OFDMA system with untrusted AF relaying

Y Jin, X Li, G Lv, M Zhao, Y Jin - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, we consider a cooperative orthogonal frequency division multiple access
(OFDMA) system, where a source communicates with multiple users with the help of an …

Achievable secrecy rate analysis of OFDM‐based multi‐user untrusted relay networks with imperfect CSI

V Özduran, N Nomikos, IS Ansari - Transactions on Emerging …, 2024 - Wiley Online Library
This study investigates the impact of imperfect channel state information (CSI), caused by
channel estimation errors and feedback delays, on the physical‐layer security performance …

Utility regions for DF relay in OFDMA-based secure communication with untrusted users

R Saini, D Mishra, S De - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
This letter investigates the utility of a trusted decode-and-forward relay in OFDMA-based
secure communication system with untrusted users. For deciding on the use of relay, we first …

Secrecy outage probability analysis for downlink NOMA with imperfect SIC at untrusted users

S Thapar, I Amin, D Mishra… - 2021 29th European Signal …, 2021 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) has come to the fore as a spectrally efficient
technique for fifth-generation networks and beyond. At the same time, NOMA faces severe …

Secrecy fairness aware NOMA for untrusted users

S Thapar, D Mishra, R Saini - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
Spectrally-efficient secure non-orthogonal multiple access (NOMA) has recently attained a
substantial research interest for fifth generation development. This work explores crucial …

Privacy-aware physical layer security techniques for smart cities

R Saini, D Mishra - Smart cities cybersecurity and privacy, 2019 - Elsevier
With the current advancements in Internet of Things (IoT) technology, which offers
connectivity of the physical world with the sophisticated information processing world, the …

QoS-Aware Optimal Power Control for Securing THz NOMA among Untrusted Heterogeneous Users

P Devi, D Mishra, R Saini - 2024 IEEE 25th International …, 2024 - ieeexplore.ieee.org
Terahertz non-orthogonal multiple access (THz-NOMA) is a new signal processing and
wireless communications technique that has recently gained significant attention in 6G …