Securing OFDMA-Based Cooperative Vehicular IoT Systems From Untrusted Platooning Networks
R Zhao, D Mishra, A Seneviratne - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
As the Internet of Things (IoT) becomes more integrated with everyday life, Vehicle-to-
Vehicle (V2V) communication is becoming increasingly crucial for intelligent transportation …
Vehicle (V2V) communication is becoming increasingly crucial for intelligent transportation …
Subcarrier pairing as channel gain tailoring: Joint resource allocation for relay-assisted secure OFDMA with untrusted users
Joint resource allocation involving optimization of subcarrier allocation, subcarrier pairing
(SCP), and power allocation in a cooperative secure orthogonal frequency division multiple …
(SCP), and power allocation in a cooperative secure orthogonal frequency division multiple …
Enhancing physical layer security in AF relay–assisted multicarrier wireless transmission
In this paper, we study the physical layer security problem in the dual‐hop orthogonal
frequency division multiplexing–based wireless communication system. First, we consider a …
frequency division multiplexing–based wireless communication system. First, we consider a …
Secure resource allocation for cooperative OFDMA system with untrusted AF relaying
Y Jin, X Li, G Lv, M Zhao, Y Jin - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, we consider a cooperative orthogonal frequency division multiple access
(OFDMA) system, where a source communicates with multiple users with the help of an …
(OFDMA) system, where a source communicates with multiple users with the help of an …
Achievable secrecy rate analysis of OFDM‐based multi‐user untrusted relay networks with imperfect CSI
This study investigates the impact of imperfect channel state information (CSI), caused by
channel estimation errors and feedback delays, on the physical‐layer security performance …
channel estimation errors and feedback delays, on the physical‐layer security performance …
Utility regions for DF relay in OFDMA-based secure communication with untrusted users
This letter investigates the utility of a trusted decode-and-forward relay in OFDMA-based
secure communication system with untrusted users. For deciding on the use of relay, we first …
secure communication system with untrusted users. For deciding on the use of relay, we first …
Secrecy outage probability analysis for downlink NOMA with imperfect SIC at untrusted users
Non-orthogonal multiple access (NOMA) has come to the fore as a spectrally efficient
technique for fifth-generation networks and beyond. At the same time, NOMA faces severe …
technique for fifth-generation networks and beyond. At the same time, NOMA faces severe …
Secrecy fairness aware NOMA for untrusted users
Spectrally-efficient secure non-orthogonal multiple access (NOMA) has recently attained a
substantial research interest for fifth generation development. This work explores crucial …
substantial research interest for fifth generation development. This work explores crucial …
Privacy-aware physical layer security techniques for smart cities
With the current advancements in Internet of Things (IoT) technology, which offers
connectivity of the physical world with the sophisticated information processing world, the …
connectivity of the physical world with the sophisticated information processing world, the …
QoS-Aware Optimal Power Control for Securing THz NOMA among Untrusted Heterogeneous Users
Terahertz non-orthogonal multiple access (THz-NOMA) is a new signal processing and
wireless communications technique that has recently gained significant attention in 6G …
wireless communications technique that has recently gained significant attention in 6G …