A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

On quantization for secret key generation from wireless channel samples

M Adil, S Wyne, SJ Nawaz - IEEE Access, 2021 - ieeexplore.ieee.org
Physical layer security (PLS) techniques hold promise for augmenting secure
communications in the 5 th generation of mobile wireless networks. Secret key generation …

Average contiguous duration (ACD)-based quantization for secret key generation in generalized gamma fading channels

M Adil, S Wyne, SJ Nawaz, B Muhammad - IEEE Access, 2021 - ieeexplore.ieee.org
The wireless channel-based Secret Key Generation (SKG) algorithms aim at securing the
wireless link against unauthorized eavesdropping by exploiting the channel's randomness …

The impact of channel imperfection and multiple eavesdroppers on security of dual-signal selection in AF-relay systems

D Lee - Wireless Networks, 2022 - Springer
This paper investigates the impact of channel imperfection and multiple eavesdroppers on
the secrecy performance of dual-signal selection in amplify and forward-relay systems. This …

Joint optimization of energy consumption and time delay in energy-constrained fog computing networks

M Xu, W Wang, M Zhang, K Cumanan… - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
In this paper, we study a joint energy harvesting (EH) and task offloading (TO) design for an
energy-constrained fog computing network, which consists of a mobile terminal and two fog …

Secrecy outage analysis of imperfect MRC in SWIPT systems with a random eavesdropper

W Hou, Q Tang - Physical Communication, 2020 - Elsevier
In this paper, we investigate the secrecy performance of simultaneous wireless information
and power transfer (SWIPT) systems in terms of the secrecy outage probability (SOP), where …

Encryption scheme against eavesdropper collusion in wireless multi‐user network

Y Huang, J Lei, W Li - IET Communications, 2020 - Wiley Online Library
In order to resist eavesdropper collusion attack in wireless multi‐user network, the authors
propose a distributed physical layer encryption (DPLE) scheme with energy‐efficient design …

Physical Layer Security for Energy-Efficient IoT with Information and Power Transfer

A Bulla, SM Shah - Security and Privacy in the Internet of Things, 2020 - taylorfrancis.com
Because of the recent advancements in 5G technology, Internet of Things (IoT) is not only a
technology shifting from aspirational visions to real-world applications, but is also evolving …

Transmitter Optimization Techniques for Physical Layer Security

M Zhang - 2019 - etheses.whiterose.ac.uk
Information security is one of the most critical issues in wireless networks as the signals
transmitted through wireless medium are more vulnerable for interception. Although the …