A comprehensive survey on cooperative relaying and jamming strategies for physical layer security
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …
conventional cryptographic schemes for securing wireless links. Many studies have shown …
On quantization for secret key generation from wireless channel samples
Physical layer security (PLS) techniques hold promise for augmenting secure
communications in the 5 th generation of mobile wireless networks. Secret key generation …
communications in the 5 th generation of mobile wireless networks. Secret key generation …
Average contiguous duration (ACD)-based quantization for secret key generation in generalized gamma fading channels
The wireless channel-based Secret Key Generation (SKG) algorithms aim at securing the
wireless link against unauthorized eavesdropping by exploiting the channel's randomness …
wireless link against unauthorized eavesdropping by exploiting the channel's randomness …
The impact of channel imperfection and multiple eavesdroppers on security of dual-signal selection in AF-relay systems
D Lee - Wireless Networks, 2022 - Springer
This paper investigates the impact of channel imperfection and multiple eavesdroppers on
the secrecy performance of dual-signal selection in amplify and forward-relay systems. This …
the secrecy performance of dual-signal selection in amplify and forward-relay systems. This …
Joint optimization of energy consumption and time delay in energy-constrained fog computing networks
In this paper, we study a joint energy harvesting (EH) and task offloading (TO) design for an
energy-constrained fog computing network, which consists of a mobile terminal and two fog …
energy-constrained fog computing network, which consists of a mobile terminal and two fog …
Secrecy outage analysis of imperfect MRC in SWIPT systems with a random eavesdropper
W Hou, Q Tang - Physical Communication, 2020 - Elsevier
In this paper, we investigate the secrecy performance of simultaneous wireless information
and power transfer (SWIPT) systems in terms of the secrecy outage probability (SOP), where …
and power transfer (SWIPT) systems in terms of the secrecy outage probability (SOP), where …
Encryption scheme against eavesdropper collusion in wireless multi‐user network
Y Huang, J Lei, W Li - IET Communications, 2020 - Wiley Online Library
In order to resist eavesdropper collusion attack in wireless multi‐user network, the authors
propose a distributed physical layer encryption (DPLE) scheme with energy‐efficient design …
propose a distributed physical layer encryption (DPLE) scheme with energy‐efficient design …
Physical Layer Security for Energy-Efficient IoT with Information and Power Transfer
Because of the recent advancements in 5G technology, Internet of Things (IoT) is not only a
technology shifting from aspirational visions to real-world applications, but is also evolving …
technology shifting from aspirational visions to real-world applications, but is also evolving …
Transmitter Optimization Techniques for Physical Layer Security
M Zhang - 2019 - etheses.whiterose.ac.uk
Information security is one of the most critical issues in wireless networks as the signals
transmitted through wireless medium are more vulnerable for interception. Although the …
transmitted through wireless medium are more vulnerable for interception. Although the …