A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Jammer-Assisted Resource Allocation in Secure OFDMA With Untrusted Users
[article]
2019
arXiv
pre-print
In this paper, we consider the problem of resource allocation in the orthogonal frequency division multiple access system with single source and M untrusted users in presence of a friendly jammer. ...
Next, we consider fair resource allocation by introducing a novel concept of subcarrier snatching with the help of jammer. ...
In contrast, secure OFDMA with untrusted users in the absence of jammer has in general no other option but to allocate a subcarrier to its best gain user. ...
arXiv:1901.03614v1
fatcat:2fq3mbti6vh5badomel5ztj7ei
OFDMA-Based DF Secure Cooperative Communication With Untrusted Users
2016
IEEE Communications Letters
In this letter we consider resource allocation for OFDMA-based secure cooperative communication by employing a trusted Decode and Forward (DF) relay among the untrusted users. ...
terms of per-user minimum support secure rate requirement. ...
Recently, resource allocation problems for improving secure capacity and system fairness in OFDMA system with untrusted users and single friendly jammer have been considered in [?] . ...
doi:10.1109/lcomm.2016.2521655
fatcat:ve3wj5xlpfdyxiykphgqo6r5uy
Secure Resource Allocation for Cooperative OFDMA System with Untrusted AF Relaying
2021
IEEE Access
In this paper, we consider a cooperative orthogonal frequency division multiple access (OFDMA) system, where a source communicates with multiple users with the help of an untrusted relay. ...
With the aim of maximizing the weighted sum secrecy rate, we formulate a joint resource allocation problem of power allocation, subcarrier assignment and subcarrier pairing. ...
However, joint resource allocation in secure cooperative OFDMA system with untrusted relay poses new challenges which have not yet been investigated.
A. ...
doi:10.1109/access.2021.3130067
fatcat:ys4z2etgxvbqpjrulqqpv7il5i
Secure resource allocation for green two-way relay networks with mutually untrusted relay and mobile users
2019
IET Networks
The authors investigate secure resource allocation for an orthogonal frequency division multiple access two-way relay network, which has several pairs of mobile users (MUs) and one energy harvesting (EH ...
In this network, the relay is untrusted and each MU pair may also overhear the other MU pairs' confidential information. ...
In [10] [11] [12] , the authors addressed secure resource allocation for relay-assisted OFDMA systems with one source, one trusted relay, and several mutually untrusted destinations, where secrecy performance ...
doi:10.1049/iet-net.2019.0002
fatcat:nnpfcwdiuzajrdrffgtiqkllbm
Resource Optimization Framework for Physical Layer Security of Dual-hop Multi-carrier Decode and Forward Relay Networks
2021
IEEE Open Journal of Antennas and Propagation
In particular, the proposed framework consists of a base station (BS), multiple users, DF relays, multiple subcarriers, and an Eve. ...
Information security of any system can also be improved by using friendly jammers that produce interference signals to Eve. ...
Later, considering power allocation in systems having untrusted relaying node, the authors of [31] proposed a framework to enhance the average SR in the presence of an untrusted AF relay. ...
doi:10.1109/ojap.2021.3078233
fatcat:qum2hprrnfcp5iekjr5qmsuin4
A Survey of Optimization Approaches for Wireless Physical Layer Security
[article]
2019
arXiv
pre-print
The topics on physical-layer security designs are then summarized from resource allocation, beamforming/precoding, and antenna/node selection and cooperation. ...
Because of its importance in security designs, the latter research direction is surveyed in a comprehensive way in this paper. ...
As in [36] , [139] , and [140] , joint resource allocation and user scheduling have been proposed to enhance physical layer security in OFDMA networks. ...
arXiv:1901.07955v1
fatcat:3pb27rlc45c3dmnjgwmjyspvb4
Applications of Economic and Pricing Models for Wireless Network Security: A Survey
[article]
2017
arXiv
pre-print
Distributed DoS (DDoS), and illegitimate behaviors of malicious users. ...
This paper provides a comprehensive literature review on applications of economic and pricing theory to security issues in wireless networks. ...
Privacy leakage in spectrum allocation An efficient spectrum allocation scheme ensures that spectrum resource is assigned to the users which can use the resource most valuably. ...
arXiv:1707.07846v1
fatcat:xb3jvolwmjad7oxdefdd2pq7dq
Securing Internet of Medical Things with Friendly-jamming schemes
2020
Computer Communications
In this paper, we present a study on using Fri-jam schemes in IoMT. We first analyze the data security in IoMT and discuss the challenges. ...
In contrast to cryptographic approaches, friendly jamming (Fri-jam) schemes will not cause extra computing cost to medical sensors, thereby becoming potential countermeasures to ensure security of IoMT ...
In a Fri-jam aided secure OFDMA system with SWIPT, [69] designed a Fri-jam aided transmission strategy in frequency-domain to optimally allocate both power and subcarrier to derive the maximal weighted ...
doi:10.1016/j.comcom.2020.06.026
pmid:32834198
pmcid:PMC7318968
fatcat:extnitk2yreifo2z2j7ua5a2ey
Joint Resource Allocation in Secure OFDMA-Based Networks Taking a Base Station as a Two-Way Relay
2017
Applied Sciences
Secure resource allocation and scheduling was put forward by D. Ng [7] in Orthogonal Frequency Division Multiple Access (OFDMA) decode-and-forward relay networks. ...
Secure communications with untrusted secondary nodes in cognitive radio networks were put forward by H. Jeon [12] . ...
The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results. ...
doi:10.3390/app7050520
fatcat:p47e3ynwdvcpfg2hdaoge2xsyu
A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
2016
Proceedings of the IEEE
Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each ...
We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. ...
The jammer aims for preventing authorized users from accessing wireless network resources and this impairs the network availability for the legitimate users. ...
doi:10.1109/jproc.2016.2558521
fatcat:yttlvv4vlne5hh5l4zs6qlh2ra
2013 Index
2014
IEEE Transactions on Wireless Communications
-that appeared in this periodical during 2013, and items from previous years that were commented upon or corrected in 2013. ...
Note that the item title is found only under the primary entry in the Author Index. ...
Liu, Yuan, +, TWC May 2013 2206-2216 Quantized Ergodic Radio Resource Allocation in OFDMA-Based Cognitive DF Relay-Assisted Networks. ...
doi:10.1109/twc.2011.09.499-tw1401-index
fatcat:w5ya5mg3sbcodb2crtuaoyk3su
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions
2019
IEEE Communications Surveys and Tutorials
Secure resource allocation with optimization approach. [227] OFDMA Single cell DL, OFDMA flat fading direct communication with perfect CSI. ...
Secure network with proposed near optimal resource allocation algorithm. [226] OFDMA Single cell UL OFDMA system with Rayleigh fading, DF and known CSI. ...
doi:10.1109/comst.2019.2933899
fatcat:bulfng6levdelgmel7oxoi6pna
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
The survey concludes with observations on potential research directions in this area. ...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
A relay-assisted OFDMA downlink was considered in [151] , where the base station and relays jointly optimize the resource allocation for artificial noise versus data. ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
The survey concludes with observations on potential research directions in this area. ...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
A relay-assisted OFDMA downlink was considered in [151] , where the base station and relays jointly optimize the resource allocation for artificial noise versus data. ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
Enhancing physical layer security in AF relay-assisted multicarrier wireless transmission
2018
Transactions on Emerging Telecommunications Technologies
In this paper, we study the physical layer security (PLS) problem in the dual hop orthogonal frequency division multiplexing (OFDM) based wireless communication system. ...
The target is to maximize the overall security of the system subject to independent power budget limits at each transmitting node and the OFDMA based exclusive sub-carrier allocation constraints. ...
Related Work and Contributions Under the umbrella of OFDMA, resources allocation for PLS in dual hop with DF protocol has been studied in [26] - [28] . ...
doi:10.1002/ett.3289
fatcat:ic26xsubarb5tilrwl25t2zoge
« Previous
Showing results 1 — 15 out of 25 results