A survey on millimeter-wave beamforming enabled UAV communications and networking
Unmanned aerial vehicles (UAVs) have found widespread commercial, civilian, and military
applications. Wireless communication has always been one of the core technologies for …
applications. Wireless communication has always been one of the core technologies for …
Physical layer security in UAV systems: Challenges and opportunities
Unmanned aerial vehicle (UAV) wireless communications has experienced an upsurge of
interest in both military and civilian applications, due to its high mobility, low cost, on …
interest in both military and civilian applications, due to its high mobility, low cost, on …
Balancing QoS and security in the edge: Existing practices, challenges, and 6G opportunities with machine learning
While the emerging 6G networks are anticipated to meet the high-end service quality
demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …
demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …
A survey of optimization approaches for wireless physical layer security
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …
increasing concerns from both academia and industry. The research on physical layer …
Cooperative jamming for physical layer security enhancement in Internet of Things
Internet of Things (IoT) is becoming an emerging paradigm to achieve ubiquitous
connectivity, via massive deployment of physical objects, such as sensors, controllers, and …
connectivity, via massive deployment of physical objects, such as sensors, controllers, and …
Secure multiple amplify-and-forward relaying with cochannel interference
We investigate the impact of cochannel interference on the security performance of multiple
amplify-and-forward (AF) relaying networks, where N intermediate AF relays assist the data …
amplify-and-forward (AF) relaying networks, where N intermediate AF relays assist the data …
Secrecy rate analysis of UAV-enabled mmWave networks using Matérn hardcore point processes
Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as
an effective solution to provide large coverage and dynamic capacity for both military and …
an effective solution to provide large coverage and dynamic capacity for both military and …
Outage-driven link selection for secure buffer-aided networks
In this paper, we investigate secure communication in a two-hop wireless network, where
multiple buffer-aided relays assist to securely forward data from the sender to the destination …
multiple buffer-aided relays assist to securely forward data from the sender to the destination …
Security analysis and defense strategy of distributed filtering under false data injection attacks
This paper investigates the distributed state estimation for multi-sensor networks under false
data injection attacks. The well-known χ 2 detector is first considered for detecting the …
data injection attacks. The well-known χ 2 detector is first considered for detecting the …
Physical-layer security and privacy for vehicle-to-everything
BM ElHalawany, AAA El-Banna… - IEEE Communications …, 2019 - ieeexplore.ieee.org
Vehicular communications in intelligent transportation systems promise to improve traffic
efficiency, road utilization, and safety. Achieving secure vehicular communications is vital for …
efficiency, road utilization, and safety. Achieving secure vehicular communications is vital for …