A survey on wireless security: Technical challenges, recent advances, and future trends
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …
accessible to both authorized and illegitimate users. This completely differs from a wired …
Balancing QoS and security in the edge: Existing practices, challenges, and 6G opportunities with machine learning
While the emerging 6G networks are anticipated to meet the high-end service quality
demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …
demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …
Robust and secure sum-rate maximization for multiuser MISO downlink systems with self-sustainable IRS
This paper investigates robust and secure multiuser multiple-input single-output (MISO)
downlink communications assisted by a self-sustainable intelligent reflection surface (IRS) …
downlink communications assisted by a self-sustainable intelligent reflection surface (IRS) …
Physical-layer security with multiuser scheduling in cognitive radio networks
In this paper, we consider a cognitive radio network that consists of one cognitive base
station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers …
station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers …
Physical layer security in multibeam satellite systems
G Zheng, PD Arapoglou… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security threats introduced due to the vulnerability of the transmission medium may hinder
the proliferation of Ka band multibeam satellite systems for civil and military data …
the proliferation of Ka band multibeam satellite systems for civil and military data …
Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis
A novel approach for ensuring confidential wireless communication is proposed and
analyzed from an information-theoretic standpoint. In this approach, the legitimate receiver …
analyzed from an information-theoretic standpoint. In this approach, the legitimate receiver …
The impact of mobility on physical layer security of 5G IoT networks
Internet of Things (IoT) is rapidly spreading and reaching a multitude of different domains,
since the fifth generation (5G) wireless technologies are the key enablers of many IoT …
since the fifth generation (5G) wireless technologies are the key enablers of many IoT …
Joint precoding and artificial noise design for MU-MIMO wiretap channels
Secure precoding superimposed with artificial noise (AN) is a promising transmission
technique to improve security by harnessing the superposition nature of the wireless …
technique to improve security by harnessing the superposition nature of the wireless …
Secrecy outage for wireless sensor networks
This letter addresses physical layer security (PLS) for a wireless sensor network, in which
multiple sensor nodes communicate with a single sink in the presence of an eavesdropper …
multiple sensor nodes communicate with a single sink in the presence of an eavesdropper …
[PDF][PDF] 基于接收机人工噪声的物理层安全技术及保密区域分析
李为, 陈彬, 魏急波, 熊春林, 张晓瀛 - 信号处理, 2012 - signal.ejournal.org.cn
提出了一种实现无线通信物理层安全的新方法, 并从信息论的角度进行了性能分析.
此方法通过合法接收者发送人工噪声来干扰窃听者信道, 同时通过抵消技术使得自身不受人工 …
此方法通过合法接收者发送人工噪声来干扰窃听者信道, 同时通过抵消技术使得自身不受人工 …