A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
, and relay networks. ...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
[157] considered utilizing a buffer-aided relay to enhance both transmission efficiency and security for two-hop relay networks. ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
, and relay networks. ...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
[157] considered utilizing a buffer-aided relay to enhance both transmission efficiency and security for two-hop relay networks. ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
A Comprehensive Review on Spectrum Management, Security and Energy-Efficient Cognitive Radio Networks
2019
International Journal of Computer Applications
In addition, we study the energy efficient routing techniques like network optimization frameworks in cooperative networks, protocols and different types of attack issues, approaches for handling the secure ...
Cognitive Radio Network (CRN) is an evident optimal solution in alleviating the challenges of spectrum unused potentially in wireless networks. ...
., [89] developed two multi-hop ad-hoc networks, That uses IEEE 802.11 based MAC protocol. ...
doi:10.5120/ijca2019918371
fatcat:d5yvihq4zfhvxbz4lml7bruxm4
Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network
2022
Computers Materials & Continua
MDPs are then utilized to determine the suitable next-hop as a forwarding node capable of securely transmitting messages. ...
As a consequence of these concerns, this paper proposes a trusted routing technique that combines blockchain infrastructure, deep neural networks, and Markov Decision Processes (MDPs) to improve the security ...
There are two types of data transmission in a wireless sensor network: direct transmission and multi-hop data transfer. Multi-hop data transfer is utilized in this instance. ...
doi:10.32604/cmc.2022.021305
fatcat:flel2m4w7zeyvfzb53purmyrde
A Secure Wireless Information and Energy Cooperation Transmission Strategy in Spectrum Sharing Networks with Untrusted Dual-Relay
2019
IEEE Access
networks with untrusted cooperative dual-relay. ...
In this paper, we investigate a problem of security cooperation transmission between a single-antenna primary system and a multi-antenna wireless-powered untrusted secondary system, where the untrusted ...
In [38] , the authors study a secure transmission scheme for dual-hop multi-antenna underlay spectrum sharing relaying systems. ...
doi:10.1109/access.2019.2932762
fatcat:of5uxf5hynegjjl5lflute3mpq
Securing Relay Networks with Artificial Noise: An Error Performance-Based Approach
2017
Entropy
We apply the concept of artificial and controlled interference in a two-hop relay network with an untrusted relay, aiming at enhancing the wireless communication secrecy between the source and the destination ...
For instance, in a secure sensor network at an airport, terminals with low secrecy levels must have restricted data access, whereas a few terminals at a much higher secrecy level are allowed to access ...
Author Contributions: Ying Liu and Liang Li developed the work in discussion with Marius Pesavento and George Alexandropoulos. ...
doi:10.3390/e19080384
fatcat:ghs57mszzjafvmwgbclnltv7di
Apply Artificial Noise To Secure Fading Relay Networks: A SER-Based Approach
[article]
2016
arXiv
pre-print
We apply the concept of artificial and controlled interference in a triangular relay network with an untrusted relay aiming at enhancing the wireless communication secrecy between the source and the destination ...
The objective of our considered AN design is to degrade the error probability performance at the untrusted relay, for different types of channel state information (CSI) at the destination. ...
wiretap channels [7] [8] [9] [10] [11] [12] , multi-user networks [13, 14] , and relay networks [15] [16] [17] [18] [19] . ...
arXiv:1506.07491v3
fatcat:uoup4cscozfuri4cvddxt3dajy
Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT with Multiple Access Mobile Edge Computing in Smart City
2019
IEEE Access
Specifically, we investigate the secure wiretap coding, resource allocation, signal processing, and multi-node cooperation, along with physical layer key generation and authentication, to cope with the ...
However, deploying cloud computing capability within the radio access network may face serious security threats, which stem from not only the existing technologies and networks but also the MA-MEC-based ...
It is worth noting that, the cooperative relaying can also be implemented with untrusted nodes for achieving a higher secrecy rate while protecting the confidential data from them [58] . ...
doi:10.1109/access.2019.2913438
fatcat:bk2b4tiy4jf5pmrmtpu72w5x7a
Safeguarding Next Generation Multiple Access Using Physical Layer Security Techniques: A Tutorial
[article]
2024
arXiv
pre-print
The purpose of this tutorial is to provide a comprehensive overview on the state-of-the-art physical layer security techniques that guarantee wireless security and privacy for NOMA networks, along with ...
This inspires the embrace of non-orthogonal multiple access (NOMA) in future wireless communication networks. ...
This performance enhancement can be demonstrated by conceiving a multi-user and multi-relay cooperative network, where the best relay and the best user pair are selected to assist the two-hop secure transmission ...
arXiv:2403.16477v1
fatcat:jc3hu4bxgbfudibqp2nn334jdi
Relaying in the Internet of Things (IoT): A Survey
2021
IEEE Access
The works in [92] , [82] and [93] studied networks with untrusted relays. ...
2) the case of an untrusted relay whose forwarding services are required in IoT networks, as shown in Fig 7.
1) Secure Relay-enabled IoT Networks with Trusted Relays The use of artificial noise is ...
doi:10.1109/access.2021.3112940
fatcat:beo5j6hyd5hwhlxj4mp5vok4sq
Towards Designing a Trusted Routing Scheme in Wireless Sensor Networks: A New Deep Blockchain Approach
2021
IEEE Access
There are two types of data transmission in a wireless sensor network: direct transmission and multi-hop data transfer. Multi-hop data transfer is utilized in this instance. ...
[27] developed a blockchain-based contractual routing system for networks with untrusted nodes using smart contracts. ...
doi:10.1109/access.2021.3098933
fatcat:4b3hanssxbctneiz5nuny65j3y
2020 Index IEEE Transactions on Wireless Communications Vol. 19
2020
IEEE Transactions on Wireless Communications
., Joint Access and Backhaul Resource Management in Satellite-Drone Networks: A Competitive Market Approach; TWC June 2020 3908-3923 Hu, Y.H., see Xia, M., TWC June 2020 3769-3781 Hua, C., see Li, M ...
Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay. ...
., +, TWC Oct. 2020 6826-6843 Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay. ...
doi:10.1109/twc.2020.3044507
fatcat:ie4rwz4dgvaqbaxf3idysubc54
2020 Index IEEE Transactions on Vehicular Technology Vol. 69
2020
IEEE Transactions on Vehicular Technology
Relaying System With SWIPT Under Outdated CSI; TVT Dec. 2020 15580-15593 Hodtani, G.A., see Gholami, R., TVT Sept. 2020 9938-9950 Hoki, K., see Kawakami, T., TVT Dec. 2020 16168-16172 Hong, C., ...
+ Check author entry for coauthors ami-mFading Channels With Integer and Non-Integerm; TVT March 2020 2785-2801 Hoang, T.M., Tran, X.N., Nguyen, B.C., and Dung, L.T., On the Performance of MIMO Full-Duplex ...
Multi-Level Sequence-Based Frequency-Hopping in Multi-Cell Networks. ...
doi:10.1109/tvt.2021.3055470
fatcat:536l4pgnufhixneoa3a3dibdma
Quantum Key Distribution Secured Optical Networks: A Survey
2021
IEEE Open Journal of the Communications Society
Finally, major findings from this comprehensive survey are summarized with highlighting open issues and challenges in QKD secured optical networks. ...
Different architectures of QKD secured optical networks are described next. ...
QKD secured Optical Network Architecture with hybrid trusted/untrusted relay based QKD A new QKD secured optical network architecture with hybrid trusted/untrusted relay based QKD has been introduced in ...
doi:10.1109/ojcoms.2021.3106659
fatcat:tshdrc2ayjf4bgtziz7cg6eio4
A Survey on Millimeter-Wave Beamforming Enabled UAV Communications and Networking
[article]
2021
arXiv
pre-print
On the other hand, UAVs serving as aerial access points or relays can significantly enhance the coverage and quality of service of the terrestrial mmWave cellular networks. ...
Subsequently, the technologies and solutions for UAV-connected mmWave cellular networks and mmWave-UAV ad hoc networks are reviewed, respectively. ...
Thus, in ad hoc networks, it is important to reasonably design the frame to guarantee efficient transmission and avoid collisions as multi-path and multi-hop routing generates [308] . ...
arXiv:2104.09204v2
fatcat:rbywt5p7uzhhzg3hbc7tnln45q
« Previous
Showing results 1 — 15 out of 218 results