A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks
2016
IEEE Transactions on Information Forensics and Security
ACKNOWLEDGMENT The authors are grateful to the anonymous reviewers and the Editor, Prof. N. Kiyavash, for their constructive comments. ...
By utilizing the zero-forcing method to eliminate the interference caused by JN to the secondary user, we study the joint optimization of the information and JN beamforming for secrecy rate maximization ...
For the present problem, we consider the joint optimization of information and JN beamforming to maximize the secrecy rate subject to per-antenna power constraints (PAPCs) at the secondary transmitter ...
doi:10.1109/tifs.2016.2594131
fatcat:3ncq6lnymveu5gddudosowwqta
A Survey of Optimization Approaches for Wireless Physical Layer Security
[article]
2019
arXiv
pre-print
The research on physical layer security mainly focuses either on the secrecy capacity/achievable secrecy rate/capacity-equivocation region from the perspective of information theory, or on the security ...
Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry. ...
wireless information and power transfer are raised in cognitive radio networks in [238] , [239] . ...
arXiv:1901.07955v1
fatcat:3pb27rlc45c3dmnjgwmjyspvb4
Introduction to the Issue on Signal Processing for Exploiting Interference Toward Energy Efficient and Secure Wireless Communications
2016
IEEE Journal on Selected Topics in Signal Processing
They present an artificial-noise approach based on rank-two beamforming to maximize the sum secrecy rate. ...
The seventh article by Cumanan et. al. proposes a secrecy rate optimization framework for multicasting secrecy networks with cooperative jamming. ...
doi:10.1109/jstsp.2016.2620703
fatcat:o4co3sihxzecrkscrdttjm5m3q
Secure Non-Orthogonal Multiple Access: An Interference Engineering Perspective
[article]
2020
arXiv
pre-print
Furthermore, we propose interference engineering strategies for more advanced full-duplex NOMA, intelligent reflecting surface NOMA, cognitive radio NOMA, and multi-cell NOMA networks, and discuss several ...
In this article, we unleash the potential of network interference and exploit it constructively to enhance physical-layer security in NOMA networks. ...
in full-duplex NOMA, intelligent reflecting surface (IRS) NOMA, cognitive radio NOMA, and multi-cell NOMA networks. ...
arXiv:2003.13488v2
fatcat:zi66mus2dbhq3djgmzczb3tenm
Joint Beamforming and Jamming Optimization for Secure Transmission in MISO-NOMA Networks
2019
IEEE Transactions on Communications
In the first scheme, the transmit power of artificial jamming is maximized, with its received power at each receiver higher than that of other users. ...
Simulation results are presented to show the effectiveness of the proposed schemes in guaranteeing the security of NOMA networks. ...
JOINT BEAMFORMING AND JAMMING OPTIMIZATION To guarantee the security of the MISO-NOMA network with legitimate transmission is not affected, in this section, we propose a joint beamforming and jamming optimization ...
doi:10.1109/tcomm.2018.2883079
fatcat:52shtoowwjc7do4m2cmzrjahhm
RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey
[article]
2024
arXiv
pre-print
However, the evolution towards the 5G technology and beyond poses new security challenges that must be addressed in order to fulfill the unprecedented performance requirements of future wireless networks ...
Consequently, the RIS technology can be adopted to improve the information-theoretic security of both RF and OWC systems. ...
The authors in [214] focused on employing an active RIS in a secure cognitive satellite-terrestrial network to optimize the secrecy rate. ...
arXiv:2403.10412v1
fatcat:yjnv3tiarnh4lpwxyam2qtpvqe
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey
[article]
2013
arXiv
pre-print
nodes or in cognitive radio systems. ...
The recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, the open problems for the on-going and future research are discussed. ...
for multi-antenna channels, and other signaling designs for relay channels or cognitive radio systems. ...
arXiv:1307.4146v2
fatcat:nvho2lziqjep5my2zlibtk6hpm
Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks
2020
KSII Transactions on Internet and Information Systems
Simulation results show that the scheme achieves the maximum SD secrecy rate with appropriate selection of power splitting ratio, and the proposed scheme guarantees security in cognitive SWIPT networks ...
Beamforming vector and power splitting ratio are jointly optimized with the objective of SU secrecy capacity maximization. ...
Under the power constraint of secondary user, the joint power split ratio and beamforming design is studied to maximize the secret information transmission rate to the secondary destination. ...
doi:10.3837/tiis.2020.01.001
fatcat:aerha42mergploxuuncitaiukm
Securing Internet of Medical Things with Friendly-jamming schemes
2020
Computer Communications
We also discuss the integration of Fri-jam schemes with various communication technologies, including beamforming, Simultaneous Wireless Information and Power Transfer (SWIPT) and full duplexity. ...
However, security and privacy become the main concerns of IoMT due to the limited computational capability, memory space and energy constraint of medical sensors, leading to the in-feasibility for conventional ...
[63] proposed the joint optimization strategy of the information signals and beamforming of Fri-jam signals to maximize the secrecy rate considering MISO broadcast channel in an underlay cognitive radio ...
doi:10.1016/j.comcom.2020.06.026
pmid:32834198
pmcid:PMC7318968
fatcat:extnitk2yreifo2z2j7ua5a2ey
Secrecy Rate Optimization for RF Powered Two-Hop Untrusted Relay Networks with Non-Linear EH Model
2020
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
The secrecy rate is maximized by jointly designing the beamforming vector at source and beamforming matrix at relay, under the constraints of transmit power at RF power supplier and destination. ...
In this letter, we investigate the secure transmission in radio frequency (RF) powered two-hop untrusted relay networks, where the source node and untrusted relay are both wireless powered by an RF power ...
The secure beamforming was designed for cognitive radio networks in [10] , while the energy efficiency was maximized for the SWIPT networks based on non-linear EH model in [12] . ...
doi:10.1587/transfun.2019cil0001
fatcat:tkcpnwbh3zafbk6xbseto3g57u
Reconfigurable Intelligent Surface Aided Multi-user Communications: State-of-the-Art Techniques and Open Issues
2021
IEEE Access
(LiFi), and Cognitive Radio (CR) systems. ...
access (RSMA), cognitive radio (CR), simultaneous wireless information and power transfer (SWIPT), light fidelity (LiFi). ...
The authors maximized the achievable secrecy rate via joint design of the transmit beamforming with jamming or AN and IRS continuous phase shifts subject to transmit power. ...
doi:10.1109/access.2021.3107316
fatcat:xkq2dayoabfhvixcfb25eobkq4
A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems
2021
Wireless Communications and Mobile Computing
Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for ...
Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints. ...
For a given channel, finding the secrecy capacity is equivalent to finding the joint distribution of V and X, i.e., pðv, xÞ, u ∈ U, x ∈ X, which maximizes the difference in (2) . ...
doi:10.1155/2021/6638405
fatcat:tm3i6b25krcgna33kweipus5ge
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
In [133] , the authors considered the joint source/relay beamforming design problem for secrecy rate maximization, through a one-way untrusted MIMO relay. ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
In [133] , the authors considered the joint source/relay beamforming design problem for secrecy rate maximization, through a one-way untrusted MIMO relay. ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
Secure Beamforming in 5G-Based Cognitive Radio Network
2019
Symmetry
Thus, we predicted that the impact of interferences would be greatly reduced by the proposed technique, and that the proposed technique would maximize the entire secrecy rate in the 5G-based cognitive ...
Cognitive radio network (CRN) and non-orthogonal multiple-access (NOMA) is a significant system in the 5G wireless communication system. ...
The proposed technique is very effective in enlarging the total secrecy rate of the CRN systems. For the future work, the proposed method may be used in IoT-based cognitive radio networks. ...
doi:10.3390/sym11101260
fatcat:u4rfka2fpfdetkgjzecnbk62ia
« Previous
Showing results 1 — 15 out of 284 results