Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

A survey on green communication and security challenges in 5G wireless communication networks

P Gandotra, RK Jha - Journal of Network and Computer Applications, 2017 - Elsevier
The 5G wireless cellular networks are evolving, to meet the drastic subscriber demands in
near future. This is accompanied with a rise in the energy consumption in cellular networks …

Wireless physical-layer identification: Modeling and validation

W Wang, Z Sun, S Piao, B Zhu… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the
physical waveforms of wireless signals to identify and classify authorized devices. As the …

Relay selection for security enhancement in cognitive relay networks

Y Liu, L Wang, TT Duy, M Elkashlan… - IEEE wireless …, 2014 - ieeexplore.ieee.org
This letter proposes several relay selection policies for secure communication in cognitive
decode-and-forward relay networks, where a pair of cognitive relays is opportunistically …

Distributed beamforming for physical-layer security of two-way relay networks

HM Wang, Q Yin, XG Xia - IEEE Transactions on Signal …, 2012 - ieeexplore.ieee.org
In this paper, we address the security of a two-way relay network in the presence of an
eavesdropper, where each node is only equipped with single antenna. We propose two …

Physical layer security for two-way untrusted relaying with friendly jammers

R Zhang, L Song, Z Han, B Jiao - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
In this paper, we consider a two-way relay system where the two sources can only
communicate through an untrusted intermediate relay and investigate the physical layer …

Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks

R Zhang, X Cheng, L Yang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the cooperation issue via spectrum sharing when employing
physical layer security concept into the device-to-device (D2D) communications underlaying …

Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting

Z Ding, KK Leung, DL Goeckel… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting
Page 1 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 6, JUNE …

5G device-to-device communication security and multipath routing solutions

A Celik, J Tetzner, K Sinha, J Matta - Applied Network Science, 2019 - Springer
Through direct communication, device-to-device (D2D) technology can increase the overall
throughput, enhance the coverage, and reduce the power consumption of cellular …

A general relaying transmission protocol for MIMO secrecy communications

Z Ding, M Peng, HH Chen - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
In this paper, we consider a secrecy relaying communication scenario where all nodes are
equipped with multiple antennas. An eavesdropper has the access to the global channel …