A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

Balancing QoS and security in the edge: Existing practices, challenges, and 6G opportunities with machine learning

ZM Fadlullah, B Mao, N Kato - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
While the emerging 6G networks are anticipated to meet the high-end service quality
demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …

Robust and secure sum-rate maximization for multiuser MISO downlink systems with self-sustainable IRS

S Hu, Z Wei, Y Cai, C Liu, DWK Ng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper investigates robust and secure multiuser multiple-input single-output (MISO)
downlink communications assisted by a self-sustainable intelligent reflection surface (IRS) …

Physical-layer security with multiuser scheduling in cognitive radio networks

Y Zou, X Wang, W Shen - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In this paper, we consider a cognitive radio network that consists of one cognitive base
station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers …

Physical layer security in multibeam satellite systems

G Zheng, PD Arapoglou… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security threats introduced due to the vulnerability of the transmission medium may hinder
the proliferation of Ka band multibeam satellite systems for civil and military data …

Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis

W Li, M Ghogho, B Chen… - IEEE Communications …, 2012 - ieeexplore.ieee.org
A novel approach for ensuring confidential wireless communication is proposed and
analyzed from an information-theoretic standpoint. In this approach, the legitimate receiver …

The impact of mobility on physical layer security of 5G IoT networks

K Yu, J Yu, C Luo - IEEE/ACM Transactions on Networking, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is rapidly spreading and reaching a multitude of different domains,
since the fifth generation (5G) wireless technologies are the key enablers of many IoT …

Joint precoding and artificial noise design for MU-MIMO wiretap channels

E Choi, M Oh, J Choi, J Park, N Lee… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Secure precoding superimposed with artificial noise (AN) is a promising transmission
technique to improve security by harnessing the superposition nature of the wireless …

Secrecy outage for wireless sensor networks

F Jameel, S Wyne, I Krikidis - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
This letter addresses physical layer security (PLS) for a wireless sensor network, in which
multiple sensor nodes communicate with a single sink in the presence of an eavesdropper …

[PDF][PDF] 基于接收机人工噪声的物理层安全技术及保密区域分析

李为, 陈彬, 魏急波, 熊春林, 张晓瀛 - 信号处理, 2012 - signal.ejournal.org.cn
提出了一种实现无线通信物理层安全的新方法, 并从信息论的角度进行了性能分析.
此方法通过合法接收者发送人工噪声来干扰窃听者信道, 同时通过抵消技术使得自身不受人工 …