Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








25 Hits in 5.7 sec

Jammer-Assisted Resource Allocation in Secure OFDMA With Untrusted Users [article]

Ravikant Saini, Abhishek Jindal, Swades De
2019 arXiv   pre-print
In this paper, we consider the problem of resource allocation in the orthogonal frequency division multiple access system with single source and M untrusted users in presence of a friendly jammer.  ...  Next, we consider fair resource allocation by introducing a novel concept of subcarrier snatching with the help of jammer.  ...  In contrast, secure OFDMA with untrusted users in the absence of jammer has in general no other option but to allocate a subcarrier to its best gain user.  ... 
arXiv:1901.03614v1 fatcat:2fq3mbti6vh5badomel5ztj7ei

OFDMA-Based DF Secure Cooperative Communication With Untrusted Users

Ravikant Saini, Deepak Mishra, Swades De
2016 IEEE Communications Letters  
In this letter we consider resource allocation for OFDMA-based secure cooperative communication by employing a trusted Decode and Forward (DF) relay among the untrusted users.  ...  terms of per-user minimum support secure rate requirement.  ...  Recently, resource allocation problems for improving secure capacity and system fairness in OFDMA system with untrusted users and single friendly jammer have been considered in [?] .  ... 
doi:10.1109/lcomm.2016.2521655 fatcat:ve3wj5xlpfdyxiykphgqo6r5uy

Secure Resource Allocation for Cooperative OFDMA System with Untrusted AF Relaying

Yifeng Jin, Xunan Li, Guocheng Lv, Meihui Zhao, Ye Jin
2021 IEEE Access  
In this paper, we consider a cooperative orthogonal frequency division multiple access (OFDMA) system, where a source communicates with multiple users with the help of an untrusted relay.  ...  With the aim of maximizing the weighted sum secrecy rate, we formulate a joint resource allocation problem of power allocation, subcarrier assignment and subcarrier pairing.  ...  However, joint resource allocation in secure cooperative OFDMA system with untrusted relay poses new challenges which have not yet been investigated. A.  ... 
doi:10.1109/access.2021.3130067 fatcat:ys4z2etgxvbqpjrulqqpv7il5i

Secure resource allocation for green two-way relay networks with mutually untrusted relay and mobile users

Fei Wang, Changchun Qin
2019 IET Networks  
The authors investigate secure resource allocation for an orthogonal frequency division multiple access two-way relay network, which has several pairs of mobile users (MUs) and one energy harvesting (EH  ...  In this network, the relay is untrusted and each MU pair may also overhear the other MU pairs' confidential information.  ...  In [10] [11] [12] , the authors addressed secure resource allocation for relay-assisted OFDMA systems with one source, one trusted relay, and several mutually untrusted destinations, where secrecy performance  ... 
doi:10.1049/iet-net.2019.0002 fatcat:nnpfcwdiuzajrdrffgtiqkllbm

Resource Optimization Framework for Physical Layer Security of Dual-hop Multi-carrier Decode and Forward Relay Networks

Marryam Nawaz, Wali Ullah Khan, Zain Ali, Asim Ihsan, Omer Waqar, Guftaar Ahmad Sardar Sidhu
2021 IEEE Open Journal of Antennas and Propagation  
In particular, the proposed framework consists of a base station (BS), multiple users, DF relays, multiple subcarriers, and an Eve.  ...  Information security of any system can also be improved by using friendly jammers that produce interference signals to Eve.  ...  Later, considering power allocation in systems having untrusted relaying node, the authors of [31] proposed a framework to enhance the average SR in the presence of an untrusted AF relay.  ... 
doi:10.1109/ojap.2021.3078233 fatcat:qum2hprrnfcp5iekjr5qmsuin4

A Survey of Optimization Approaches for Wireless Physical Layer Security [article]

Dong Wang, Bo Bai, Wenbo Zhao, Zhu Han
2019 arXiv   pre-print
The topics on physical-layer security designs are then summarized from resource allocation, beamforming/precoding, and antenna/node selection and cooperation.  ...  Because of its importance in security designs, the latter research direction is surveyed in a comprehensive way in this paper.  ...  As in [36] , [139] , and [140] , joint resource allocation and user scheduling have been proposed to enhance physical layer security in OFDMA networks.  ... 
arXiv:1901.07955v1 fatcat:3pb27rlc45c3dmnjgwmjyspvb4

Applications of Economic and Pricing Models for Wireless Network Security: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Zhu Han
2017 arXiv   pre-print
Distributed DoS (DDoS), and illegitimate behaviors of malicious users.  ...  This paper provides a comprehensive literature review on applications of economic and pricing theory to security issues in wireless networks.  ...  Privacy leakage in spectrum allocation An efficient spectrum allocation scheme ensures that spectrum resource is assigned to the users which can use the resource most valuably.  ... 
arXiv:1707.07846v1 fatcat:xb3jvolwmjad7oxdefdd2pq7dq

Securing Internet of Medical Things with Friendly-jamming schemes

Xuran Li, Hong-Ning Dai, Qubeijian Wang, Muhammad Imran, Dengwang Li, Muhammad Ali Imran
2020 Computer Communications  
In this paper, we present a study on using Fri-jam schemes in IoMT. We first analyze the data security in IoMT and discuss the challenges.  ...  In contrast to cryptographic approaches, friendly jamming (Fri-jam) schemes will not cause extra computing cost to medical sensors, thereby becoming potential countermeasures to ensure security of IoMT  ...  In a Fri-jam aided secure OFDMA system with SWIPT, [69] designed a Fri-jam aided transmission strategy in frequency-domain to optimally allocate both power and subcarrier to derive the maximal weighted  ... 
doi:10.1016/j.comcom.2020.06.026 pmid:32834198 pmcid:PMC7318968 fatcat:extnitk2yreifo2z2j7ua5a2ey

Joint Resource Allocation in Secure OFDMA-Based Networks Taking a Base Station as a Two-Way Relay

Ning Du, Fasheng Liu, Yan Zang
2017 Applied Sciences  
Secure resource allocation and scheduling was put forward by D. Ng [7] in Orthogonal Frequency Division Multiple Access (OFDMA) decode-and-forward relay networks.  ...  Secure communications with untrusted secondary nodes in cognitive radio networks were put forward by H. Jeon [12] .  ...  The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.  ... 
doi:10.3390/app7050520 fatcat:p47e3ynwdvcpfg2hdaoge2xsyu

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

Yulong Zou, Jia Zhu, Xianbin Wang, Lajos Hanzo
2016 Proceedings of the IEEE  
Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each  ...  We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer.  ...  The jammer aims for preventing authorized users from accessing wireless network resources and this impairs the network availability for the legitimate users.  ... 
doi:10.1109/jproc.2016.2558521 fatcat:yttlvv4vlne5hh5l4zs6qlh2ra

2013 Index

2014 IEEE Transactions on Wireless Communications  
-that appeared in this periodical during 2013, and items from previous years that were commented upon or corrected in 2013.  ...  Note that the item title is found only under the primary entry in the Author Index.  ...  Liu, Yuan, +, TWC May 2013 2206-2216 Quantized Ergodic Radio Resource Allocation in OFDMA-Based Cognitive DF Relay-Assisted Networks.  ... 
doi:10.1109/twc.2011.09.499-tw1401-index fatcat:w5ya5mg3sbcodb2crtuaoyk3su

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
Secure resource allocation with optimization approach. [227] OFDMA Single cell DL, OFDMA flat fading direct communication with perfect CSI.  ...  Secure network with proposed near optimal resource allocation algorithm. [226] OFDMA Single cell UL OFDMA system with Rayleigh fading, DF and known CSI.  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
The survey concludes with observations on potential research directions in this area.  ...  This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks.  ...  A relay-assisted OFDMA downlink was considered in [151] , where the base station and relays jointly optimize the resource allocation for artificial noise versus data.  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
The survey concludes with observations on potential research directions in this area.  ...  This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks.  ...  A relay-assisted OFDMA downlink was considered in [151] , where the base station and relays jointly optimize the resource allocation for artificial noise versus data.  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

Enhancing physical layer security in AF relay-assisted multicarrier wireless transmission

Waqas Aman, Guftaar Ahmad Sardar Sidhu, Haji M. Furqan, Zain Ali
2018 Transactions on Emerging Telecommunications Technologies  
In this paper, we study the physical layer security (PLS) problem in the dual hop orthogonal frequency division multiplexing (OFDM) based wireless communication system.  ...  The target is to maximize the overall security of the system subject to independent power budget limits at each transmitting node and the OFDMA based exclusive sub-carrier allocation constraints.  ...  Related Work and Contributions Under the umbrella of OFDMA, resources allocation for PLS in dual hop with DF protocol has been studied in [26] - [28] .  ... 
doi:10.1002/ett.3289 fatcat:ic26xsubarb5tilrwl25t2zoge
« Previous Showing results 1 — 15 out of 25 results