Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Simultaneous wireless information and power transfer (SWIPT): Recent advances and future challenges
Initial efforts on wireless power transfer (WPT) have concentrated toward long-distance
transmission and high power applications. Nonetheless, the lower achievable transmission …
transmission and high power applications. Nonetheless, the lower achievable transmission …
5G-advanced toward 6G: Past, present, and future
Since the start of 5G work in 3GPP in early 2016, tremendous progress has been made in
both standardization and commercial deployments. 3GPP is now entering the second phase …
both standardization and commercial deployments. 3GPP is now entering the second phase …
A survey of physical layer security techniques for 5G wireless networks and challenges ahead
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …
theoretic approaches has received significant research interest recently. The key idea …
Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities
N Wang, P Wang, A Alipour-Fanid… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
The fifth generation (5G) wireless technologies serve as a key propellent to meet the
increasing demands of the future Internet of Things (IoT) networks. For wireless …
increasing demands of the future Internet of Things (IoT) networks. For wireless …
DC programming and DCA: thirty years of developments
HA Le Thi, T Pham Dinh - Mathematical Programming, 2018 - Springer
The year 2015 marks the 30th birthday of DC (Difference of Convex functions) programming
and DCA (DC Algorithms) which constitute the backbone of nonconvex programming and …
and DCA (DC Algorithms) which constitute the backbone of nonconvex programming and …
A survey of in-band full-duplex transmission: From the perspective of PHY and MAC layers
In-band full-duplex (IBFD) transmission represents an attractive option for increasing the
throughput of wireless communication systems. A key challenge for IBFD transmission is …
throughput of wireless communication systems. A key challenge for IBFD transmission is …
A comprehensive survey on cooperative relaying and jamming strategies for physical layer security
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …
conventional cryptographic schemes for securing wireless links. Many studies have shown …
Achieving covert wireless communications using a full-duplex receiver
Covert communications hide the transmission of a message from a watchful adversary while
ensuring a certain decoding performance at the receiver. In this paper, a wireless …
ensuring a certain decoding performance at the receiver. In this paper, a wireless …
Interference management in 5G and beyond network: Requirements, challenges and future directions
In the modern technological world, wireless communication has taken a massive leap from
the conventional communication system to a new radio communication network. The novel …
the conventional communication system to a new radio communication network. The novel …