Principles of physical layer security in multiuser wireless networks: A survey
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …
multiuser wireless networks. The essential premise of physical layer security is to enable the …
A survey on green communication and security challenges in 5G wireless communication networks
P Gandotra, RK Jha - Journal of Network and Computer Applications, 2017 - Elsevier
The 5G wireless cellular networks are evolving, to meet the drastic subscriber demands in
near future. This is accompanied with a rise in the energy consumption in cellular networks …
near future. This is accompanied with a rise in the energy consumption in cellular networks …
Wireless physical-layer identification: Modeling and validation
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the
physical waveforms of wireless signals to identify and classify authorized devices. As the …
physical waveforms of wireless signals to identify and classify authorized devices. As the …
Relay selection for security enhancement in cognitive relay networks
This letter proposes several relay selection policies for secure communication in cognitive
decode-and-forward relay networks, where a pair of cognitive relays is opportunistically …
decode-and-forward relay networks, where a pair of cognitive relays is opportunistically …
Distributed beamforming for physical-layer security of two-way relay networks
In this paper, we address the security of a two-way relay network in the presence of an
eavesdropper, where each node is only equipped with single antenna. We propose two …
eavesdropper, where each node is only equipped with single antenna. We propose two …
Physical layer security for two-way untrusted relaying with friendly jammers
In this paper, we consider a two-way relay system where the two sources can only
communicate through an untrusted intermediate relay and investigate the physical layer …
communicate through an untrusted intermediate relay and investigate the physical layer …
Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks
In this paper, we investigate the cooperation issue via spectrum sharing when employing
physical layer security concept into the device-to-device (D2D) communications underlaying …
physical layer security concept into the device-to-device (D2D) communications underlaying …
Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting
Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting
Page 1 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 6, JUNE …
Page 1 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 6, JUNE …
5G device-to-device communication security and multipath routing solutions
Through direct communication, device-to-device (D2D) technology can increase the overall
throughput, enhance the coverage, and reduce the power consumption of cellular …
throughput, enhance the coverage, and reduce the power consumption of cellular …
A general relaying transmission protocol for MIMO secrecy communications
In this paper, we consider a secrecy relaying communication scenario where all nodes are
equipped with multiple antennas. An eavesdropper has the access to the global channel …
equipped with multiple antennas. An eavesdropper has the access to the global channel …