You are currently viewing a new version of our website. To view the old version click .

32 Results Found

  • Article
  • Open Access
1,442 Views
21 Pages

21 November 2023

In this paper, we study a three-layer wiretap network including the source node in the top layer, N nodes in the middle layer and L sink nodes in the bottom layer. Each sink node recovers the message generated from the source node correctly via the m...

  • Article
  • Open Access
2 Citations
1,843 Views
9 Pages

26 September 2023

Secrecy capacity is usually employed as the performance metric of the physical layer security in fiber-optic wiretap channels. However, secrecy capacity can only qualitatively evaluate the physical layer security, and it cannot quantitatively evaluat...

  • Article
  • Open Access
6 Citations
2,343 Views
24 Pages

Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers

  • Zhihui Shang,
  • Tao Zhang,
  • Yueming Cai,
  • Weiwei Yang,
  • Hao Wu,
  • Yu Zhang and
  • Liwei Tao

7 March 2020

This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), whi...

  • Feature Paper
  • Article
  • Open Access
196 Views
20 Pages

On Best Erasure Wiretap Codes: Equivocation Matrices and Design Principles

  • Willie K. Harrison,
  • Truman Welling,
  • Andrew Swain and
  • Morteza Shoushtari

9 December 2025

Physical-layer security can aid in establishing secure telecommunication networks including cellular, Internet of Things, and telemetry networks, among others. Channel sounding techniques and/or telemetry systems for reporting channel conditions, cou...

  • Article
  • Open Access
2 Citations
2,801 Views
14 Pages

Secrecy Capacity of a Class of Erasure Wiretap Channels in WBAN

  • Bin Wang,
  • Jun Deng,
  • Yanjing Sun,
  • Wangmei Guo and
  • Guiguo Feng

26 November 2018

In wireless body area networks (WBANs), the secrecy of personal health information is vulnerable to attacks due to the openness of wireless communication. In this paper, we study the security problem of WBANs, where there exists an attacker or eavesd...

  • Article
  • Open Access
2 Citations
3,230 Views
16 Pages

14 November 2019

Several results relating additive ideals of numerical semigroups and algebraic-geometry codes are presented. In particular, we deal with the set of non-redundant parity-checks, the code length, the generalized Hamming weights, and the isometry-dual s...

  • Article
  • Open Access
1 Citations
2,813 Views
31 Pages

Secure Cognitive Radio-Enabled Vehicular Communications under Spectrum-Sharing Constraints

  • Suneel Yadav,
  • Anshul Pandey,
  • Dinh-Thuan Do,
  • Byung Moo Lee and
  • Adão Silva

28 October 2021

Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. O...

  • Article
  • Open Access
4 Citations
3,688 Views
21 Pages

AN-Aided Secure Beamforming in Power-Splitting-Enabled SWIPT MIMO Heterogeneous Wireless Sensor Networks

  • Weili Ge,
  • Zhengyu Zhu,
  • Wanming Hao,
  • Yi Wang,
  • Zhongyong Wang,
  • Qiong Wu and
  • Zheng Chu

In this paper, we investigate the physical layer security in a two-tier heterogeneous wireless sensor network (HWSN) depending on simultaneous wireless information and power transfer (SWIPT) approach for multiuser multiple-input multiple-output wiret...

  • Article
  • Open Access
1 Citations
4,348 Views
11 Pages

21 May 2017

Due to the broadcast nature of wireless media, all nodes in the coverage of a transmitter are capable of capturing its signals, thus wireless transmission is sensitive to wiretapping. Several existing schemes place an emphasis on secrecy rate improve...

  • Article
  • Open Access
2 Citations
1,793 Views
13 Pages

Physical Layer Security: Channel Sounding Results for the Multi-Antenna Wiretap Channel

  • Daniel Harman,
  • Karl Knapp,
  • Tyler Sweat,
  • Philip Lundrigan,
  • Michael Rice and
  • Willie Harrison

29 September 2023

Many physical-layer security works in the literature rely on purely theoretical work or simulated results to establish the value of physical-layer security in securing communications. We consider the secrecy capacity of a wireless Gaussian wiretap ch...

  • Article
  • Open Access
121 Citations
10,238 Views
16 Pages

24 December 2015

The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, “things”...

  • Proceeding Paper
  • Open Access
507 Views
9 Pages

Application of Terminal Audio Mixing in Multi-Bandwidth End-to-End Encrypted Voice Conference

  • Chi-Hung Lien,
  • Ya-Ching Tu,
  • Sheng-Lian Liao,
  • Juei-Chi Chu,
  • Chia-Yu Hsieh and
  • Jyun-Jia Jhang

Recently, the increasing frequency of cybersecurity incidents has raised concerns about communication security and personal privacy. In a zero-trust network environment, it is critically important to protect communication content and ensure that it i...

  • Article
  • Open Access
2 Citations
1,544 Views
19 Pages

16 February 2024

Cooperative communication and cognitive radio can effectively improve spectrum utilization, coverage range, and system throughput of vehicular networks, whereas they also incur several security issues and wiretapping attacks. Thus, security and threa...

  • Article
  • Open Access
1 Citations
2,795 Views
26 Pages

26 September 2019

We investigate the secure degrees of freedom (s.d.o.f.) of three new channel models: broadcast channel with combating helpers, interference channel with selfish users, and multiple access wiretap channel with deviating users. The goal of introducing...

  • Article
  • Open Access
3 Citations
2,785 Views
14 Pages

On the Performance of Random Cognitive mmWave Sensor Networks

  • Yi Song,
  • Weiwei Yang,
  • Zhongwu Xiang,
  • Biao Wang and
  • Yueming Cai

19 July 2019

This paper investigates the secrecy performance of a cognitive millimeter wave (mmWave) wiretap sensor network, where the secondary transmitter (SU-Tx) intends to communicate with a secondary sensor node under the interference temperature constraint...

  • Article
  • Open Access
8 Citations
4,702 Views
15 Pages

4 May 2017

Security and privacy are crucial for cognitive sensor radio networks (CSRNs) due to the possible eavesdropping between secondary sensors and the secondary fusion center. Motivated by this observation, we investigate the physical layer security perfor...

  • Article
  • Open Access
3 Citations
3,500 Views
17 Pages

7 February 2020

Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper. In the proposed scheme, relay R uses non-orthogonal multiple access (NOMA) technology to...

  • Article
  • Open Access
4 Citations
2,582 Views
17 Pages

Secure On-Off Transmission in UAV Relay-Assisted mmWave Networks

  • Ruiqian Ma,
  • Weiwei Yang,
  • Yu Zhang and
  • Songqing Wang

2 October 2019

This paper investigates secure transmission in unmanned aerial vehicle (UAV) relay-assisted millimeter wave (mmWave) networks, where the selected UAV relay performs secure transmission in both the on-off and non-on-off schemes. Meanwhile, there are m...

  • Review
  • Open Access
59 Citations
10,613 Views
34 Pages

An Overview of Key Technologies in Physical Layer Security

  • Abraham Sanenga,
  • Galefang Allycan Mapunda,
  • Tshepiso Merapelo Ludo Jacob,
  • Leatile Marata,
  • Bokamoso Basutli and
  • Joseph Monamati Chuma

6 November 2020

The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives ri...

  • Article
  • Open Access
2,341 Views
19 Pages

Secure Polar Coding for the Primitive Relay Wiretap Channel

  • Manos Athanasakos and
  • George Karagiannidis

9 April 2021

With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristic...

  • Article
  • Open Access
1 Citations
2,164 Views
22 Pages

22 January 2025

As one of the promising technologies of 6G, dual-function radar communication (DFRC) integrates communication and radar sensing networks. However, with the application and deployment of DFRC, its security problem has become a significantly important...

  • Article
  • Open Access
4 Citations
3,419 Views
20 Pages

Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages

  • Yi Song,
  • Weiwei Yang,
  • Zhongwu Xiang,
  • Yiliang Liu and
  • Yueming Cai

22 April 2019

Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link...

  • Article
  • Open Access
4 Citations
1,396 Views
22 Pages

31 December 2024

Symbiotic radio (SR), which has recently been introduced as an effective solution for 5G wireless networks, stands out with system models that include hybrid devices that share the frequency spectrum and transmit information to the same receiver. How...

  • Article
  • Open Access
5 Citations
4,032 Views
16 Pages

Physical Layer Intercept Probability in Wireless Sensor Networks over Fisher–Snedecor \({\mathcal{F}}\) Fading Channels

  • Srđan Maričić,
  • Nenad Milošević,
  • Dejan Drajić,
  • Dejan Milić and
  • Jelena Anastasov

In this paper, we analyze the physical layer security (PLS) of an arbitrarily dimensioned wireless sensor network (WSN) in the presence of an unauthorized attacker. Various scheduling schemes have been exploited in order to enhance the secure transmi...

  • Article
  • Open Access
3,038 Views
17 Pages

7 December 2020

Since wireless systems allow for easier access to communication paths than wired systems, it is necessary to improve their dependability against cyberterrorists. To make wireless systems more dependable, additional measures at the lower layer are req...

  • Article
  • Open Access
7 Citations
2,853 Views
17 Pages

15 March 2019

In this paper, an underlay cooperative cognitive network using a non-orthogonal multiple access (UCCN-NOMA) system is investigated, in which the intermediate multiple relays help to decode and forward two signals x 1 and x 2 from...

  • Article
  • Open Access
1,323 Views
21 Pages

Unmanned aerial vehicles (UAVs) have shown significant advantages in disaster relief, emergency communication, and Integrated Sensing and Communication (ISAC). However, the escalating demand for UAV spectrum is severely restricted by the scarcity of...

  • Review
  • Open Access
9 Citations
4,602 Views
36 Pages

9 May 2022

With the proliferation of 5G mobile networks within next-generation wireless communication, the design and optimization of 5G networks are progressing in the direction of improving the physical layer security (PLS) paradigm. This phenomenon is due to...

  • Communication
  • Open Access
17 Citations
5,662 Views
12 Pages

19 February 2021

Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting...

  • Article
  • Open Access
2 Citations
1,226 Views
21 Pages

A Secure Cooperative Transmission of Image Super-Resolution in Wireless Relay Networks

  • Hien-Thuan Duong,
  • Ca V. Phan,
  • Quoc-Tuan Vien and
  • Tuan T. Nguyen

6 September 2023

The image transmission over wireless media experiences not only unavailable performance loss caused by the environment and hardware issues, but also information leakage to eavesdroppers who can overhear and attempt to recover the images. This paper p...

  • Article
  • Open Access
11 Citations
4,872 Views
23 Pages

19 June 2020

Intelligent reflecting surface (IRS) is a very promising technology for the development of beyond 5G or 6G wireless communications due to its low complexity, intelligence, and green energy-efficient properties. In this paper, we combined IRS with phy...