4.6 Article

Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers

Kunrui Cao et al.

Summary: This study investigates the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with energy harvesting jammers. Three different friendly EH jammer selection schemes are proposed to enhance system secrecy performance. Analytical and numerical results show that these schemes can achieve better secrecy performance than conventional schemes without EH jammers, with different levels of secrecy diversity orders and convergence to the same effective secrecy throughput floor.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

An efficient public key secure scheme for cloud and IoT security

Chandrasegar Thirumalai et al.

COMPUTER COMMUNICATIONS (2020)

Article Automation & Control Systems

A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems

Longpeng Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Engineering, Electrical & Electronic

Prediction and Communication Co-Design for Ultra-Reliable and Low-Latency Communications

Zhanwei Hou et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Review Computer Science, Information Systems

Unmanned aerial vehicle for internet of everything: Opportunities and challenges

Yalin Liu et al.

COMPUTER COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Optimized Age of Information Tail for Ultra-Reliable Low-Latency Communications in Vehicular Networks

Mohamed K. Abdel-Aziz et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Joint Frame Design and Resource Allocation for Ultra-Reliable and Low-Latency Vehicular Networks

Haojun Yang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Safeguarding UAV IoT Communication Systems Against Randomly Located Eavesdroppers

Hongjiang Lei et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Theory & Methods

Securing transmissions by friendly jamming scheme in wireless networks

Guangshun Li et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2020)

Article Computer Science, Information Systems

Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario

Ahmed A. Abd El-Latif et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)

Review Computer Science, Information Systems

Securing Internet of Medical Things with Friendly-jamming schemes

Xuran Li et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

Ultra-Reliable and Low-Latency Communications for Connected Vehicles: Challenges and Solutions

Haojun Yang et al.

IEEE NETWORK (2020)

Article Engineering, Electrical & Electronic

Energy-Constrained UAV-Assisted Secure Communications With Position Optimization and Cooperative Jamming

Wei Wang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Automation & Control Systems

Learning-Based Energy-Efficient Resource Management by Heterogeneous RF/VLC for Ultra-Reliable Low-Latency Industrial IoT Networks

Helin Yang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Engineering, Electrical & Electronic

On the Physical Layer Security of Underlay Relay-Aided Device-to-Device Communications

Majid H. Khoshafa et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

Secure Transmission in Wiretap Channels Using Full-Duplex Relay-Aided D2D Communications With Outdated CSI

Majid H. Khoshafa et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2020)

Article Engineering, Electrical & Electronic

Improving PHY-Security of UAV-Enabled Transmission With Wireless Energy Harvesting: Robust Trajectory Design and Communications Resource Allocation

Milad Tatar Mamaghani et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Hardware & Architecture

SECURITY RISK ASSESSMENT FOR 5G NETWORKS: NATIONAL PERSPECTIVE

Jordi Mongay Batalla et al.

IEEE WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

Secrecy capacity against adaptive eavesdroppers in a random wireless network using friendly jammers and protected zone

J. E. Giti et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Information Systems

Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey

Wajid Rafique et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Theory & Methods

Energy-Constrained SWIPT Networks: Enhancing Physical Layer Security With FD Self-Jamming

Xuanxuan Tang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

Physical Layer Security in Buffer-State-Based Max-Ratio Relay Selection Exploiting Broadcasting With Cooperative Beamforming and Jamming

Ryota Nakai et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Telecommunications

Artificial-Noise-Aided Optimal Beamforming in Layered Physical Layer Security

Wei Zhang et al.

IEEE COMMUNICATIONS LETTERS (2019)

Article Telecommunications

Secure UAV Communication With Cooperative Jamming and Trajectory Control

Canhui Zhong et al.

IEEE COMMUNICATIONS LETTERS (2019)

Article Engineering, Electrical & Electronic

Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks

Hui-Ming Wang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2019)

Article Engineering, Electrical & Electronic

5G Ultra Reliable Low-Latency Communications in Factory Automation Leveraging Licensed and Unlicensed Bands

Georg Hampel et al.

IEEE COMMUNICATIONS MAGAZINE (2019)

Article Engineering, Electrical & Electronic

Ultra-Reliable and Low-Latency Communications in Unmanned Aerial Vehicle Communication Systems

Changyang She et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2019)

Article Computer Science, Information Systems

To Establish a Secure Channel From a Full-Duplex Transmitter to a Half-Duplex Receiver: An Artificial-Noise-Aided Scheme

Xinyue Hu et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2019)

Article Engineering, Electrical & Electronic

Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming

Yan Huo et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2019)

Article Engineering, Electrical & Electronic

Wireless Access in Ultra-Reliable Low-Latency Communication (URLLC)

Petar Popovski et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2019)

Article Computer Science, Theory & Methods

Perception layer security in Internet of Things

Hasan Ali Khattak et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Theory & Methods

Secrecy Performance Analysis of Wireless Communications in the Presence of UAV Jammer and Randomly Located UAV Eavesdroppers

Jinchuan Tang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Hardware & Architecture

Physical Layer Security for Ultra-Reliable and Low-Latency Communications

Riqing Chen et al.

IEEE WIRELESS COMMUNICATIONS (2019)

Article Computer Science, Information Systems

UAV-enabled Friendly Jamming Scheme to Secure Industrial Internet of Things

Qubeijian Wang et al.

JOURNAL OF COMMUNICATIONS AND NETWORKS (2019)

Article Computer Science, Information Systems

UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel

An Li et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2019)

Article Computer Science, Information Systems

Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach

Farhan Ullah et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Enabling Technologies for Ultra-Reliable and Low Latency Communications: From PHY and MAC Layer Perspectives

Gordon J. Sutton et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

UAV-Aided Secure Transmission in MISOME Wiretap Channels With Imperfect CSI

Yang Chen et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Cooperative Jamming for Secure UAV Communications With Partial Eavesdropper Information

Yupeng Li et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT

B. D. Deebak et al.

IEEE ACCESS (2019)

Article Engineering, Electrical & Electronic

5G for Vehicular Communications

Syed Adeel Ali Shah et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Information Systems

Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges

Tharindu D. Ponnimbaduge Perera et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Engineering, Electrical & Electronic

Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT

Fuhui Zhou et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Physically Securing Energy-Based Massive MIMO MAC via Joint Alignment of Multi-User Constellations and Artificial Noise

Yan-Yu Zhang et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Computer Science, Hardware & Architecture

Toward Low-Latency and Ultra-Reliable Virtual Reality

Mohammed S. Elbamby et al.

IEEE NETWORK (2018)

Article Computer Science, Hardware & Architecture

Wireless Access for Ultra-Reliable Low-Latency Communication: Principles and Building Blocks

Petar Popovski et al.

IEEE NETWORK (2018)

Article Engineering, Electrical & Electronic

Robust MISO Beamforming With Cooperative Jamming for Secure Transmission From Perspectives of QoS and Secrecy Rate

Hui Ma et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2018)

Article Computer Science, Theory & Methods

Artificial Noise Aided Secure Precoding for MIMO Untrusted Two-Way Relay Systems With Perfect and Imperfect Channel State Information

Quanzhong Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Engineering, Electrical & Electronic

UAV-Aided Secure Communications With Cooperative Jamming

Hoon Lee et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

Artificial Noise-Aided User Scheduling From the Perspective of Secrecy Outage Probability

Inkyu Bang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

Artificial-Noise-Aided Secure Multicast Precoding for Directional Modulation Systems

Feng Shu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Hardware & Architecture

EXPLOITING INTERFERENCE FOR SECRECY WIRELESS INFORMATION AND POWER TRANSFER

Yuan Liu et al.

IEEE WIRELESS COMMUNICATIONS (2018)

Article Computer Science, Hardware & Architecture

JAMMING STRATEGIES FOR PHYSICAL LAYER SECURITY

Yan Huo et al.

IEEE WIRELESS COMMUNICATIONS (2018)

Article Computer Science, Information Systems

Secrecy Capacity of Artificial Noise Aided Secure Communication in MIMO Rician Channels

Mansoor Ahmed et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Artificial Noise Aided Precoding With Imperfect CSI in Full-Duplex Relaying Secure Communications

Yuanjian Li et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Adaptive Wireless-Powered Relaying Schemes With Cooperative Jamming for Two-Hop Secure Communication

Kisong Lee et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things

Lin Hu et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Polar Coding for the Multiple Access Wiretap Channel via Rate-Splitting and Cooperative Jamming

Remi A. Chou et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2018)

Article Engineering, Electrical & Electronic

Improving Physical Layer Security via a UAV Friendly Jammer for Unknown Eavesdropper Location

Yi Zhou et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Information Systems

Secrecy Performance Analysis of Artificial-Noise-Aided Spatial Modulation in the Presence of Imperfect CSI

Xiangbin Yu et al.

IEEE ACCESS (2018)

Article Engineering, Electrical & Electronic

Secrecy Energy Efficiency Optimization for Artificial Noise Aided Physical-Layer Security in OFDM-Based Cognitive Radio Networks

Yuhan Jiang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

A New Cooperative Jamming Technique for a Two-Hop Amplify-and-Forward Relay Network With an Eavesdropper

Yongyun Choi et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Information Systems

Relay Selection for Improved Physical Layer Security in Cognitive Relay Networks Using Artificial Noise

Shaobo Jia et al.

IEEE ACCESS (2018)

Article Telecommunications

Secure Wireless Powered and Cooperative Jamming D2D Communications

Zheng Chu et al.

IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING (2018)

Article Telecommunications

Control of Cognitive Networks With Friendly Jamming as a Service

Yunus Sarikaya et al.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2018)

Article Engineering, Electrical & Electronic

Friendly Jamming in a MIMO Wiretap Interference Network: A Nonconvex Game Approach

Peyman Siyari et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2017)

Article Computer Science, Hardware & Architecture

Security-Aware and Privacy-Preserving D2D Communications in 5G

Aiqing Zhang et al.

IEEE NETWORK (2017)

Article Computer Science, Theory & Methods

Precoding and Cooperative Jamming in Multi-Antenna Two-Way Relaying Wiretap Systems Without Eavesdropper's Channel State Information

Hang Long et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Engineering, Electrical & Electronic

Joint Design of Optimal Precoding and Cooperative Jamming for Multiuser Secure Broadcast Systems

Jae-Mo Kang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Engineering, Electrical & Electronic

Antieavesdropping With Selfish Jamming in Wireless Networks: A Bertrand Game Approach

Kun Wang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Engineering, Electrical & Electronic

Artificial-Noise-Aided Beamforming Design in the MISOME Wiretap Channel Under the Secrecy Outage Probability Constraint

Bo Wang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

Physical Layer Security in Heterogeneous Networks With Jammer Selection and Full-Duplex Users

Weijun Tang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT

Fuhui Zhou et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers

Tong-Xing Zheng et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Article Computer Science, Information Systems

Robust AN-Aided Beamforming Design for Secure MISO Cognitive Radio Based on a Practical Nonlinear EH Model

Yangchao Huang et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks

Kanapathippillai Cumanan et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Joint Cooperative Beamforming and Jamming for Physical-Layer Security of Decode-and-Forward Relay Networks

Haiyan Guo et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services

Jehad M. Hamamreh et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Destination Assisted Jamming and Beamforming for Improving the Security of AF Relay Systems

Nian Ouyang et al.

IEEE ACCESS (2017)

Article Telecommunications

AN-Aided Relay-Selection Scheme for Securing Untrusted RF-EH Relay Systems

Asma Mabrouk et al.

IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING (2017)

Article Telecommunications

Artificial-Noise-Aided Secure MIMO Full-Duplex Relay Channels With Fixed-Power Transmissions

Ahmed El Shafie et al.

IEEE COMMUNICATIONS LETTERS (2016)

Article Engineering, Electrical & Electronic

Accumulate and Jam: Towards Secure Communication via A Wireless-Powered Full-Duplex Jammer

Ying Bi et al.

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2016)

Article Engineering, Electrical & Electronic

Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks

Yansha Deng et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2016)

Article Computer Science, Theory & Methods

Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security

Xiaofu Wu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks

Van-Dinh Nguyen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Engineering, Electrical & Electronic

Limited Rate Feedback in a MIMO Wiretap Channel With a Cooperative Jammer

Xinjie Yang et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2016)

Article Engineering, Electrical & Electronic

Precoding and Artificial Noise Design for Cognitive MIMOME Wiretap Channels

Bing Fang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Engineering, Electrical & Electronic

Optimal Semiadaptive Transmission With Artificial-Noise-Aided Beamforming in MISO Wiretap Channels

Zongmian Li et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Engineering, Electrical & Electronic

Optimal Power Allocation for Artificial Noise Under Imperfect CSI Against Spatially Random Eavesdroppers

Tong-Xing Zheng et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Engineering, Electrical & Electronic

Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems

Jun Xiong et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Engineering, Electrical & Electronic

Ergodic Achievable Secrecy Rate of Multiple-Antenna Relay Systems With Cooperative Jamming

Rui Zhao et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Engineering, Electrical & Electronic

Artificial-Noise-Aided Transmission in Multi-Antenna Relay Wiretap Channels With Spatially Random Eavesdroppers

Chenxi Liu et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Engineering, Electrical & Electronic

Friendly Jamming on Access Points: Analysis and Real-World Measurements

Daniel S. Berger et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Engineering, Electrical & Electronic

Full-Duplex Wireless Communications: Challenges, Solutions, and Future Research Directions

Zhongshan Zhang et al.

PROCEEDINGS OF THE IEEE (2016)

Article Computer Science, Information Systems

Robust Artificial Noise-Aided Secure Beamforming in Wireless-Powered Non-Regenerative Relay Networks

Bin Li et al.

IEEE ACCESS (2016)

Article Telecommunications

Social Tie Based Cooperative Jamming for Physical Layer Security

Ling Tang et al.

IEEE COMMUNICATIONS LETTERS (2015)

Article Engineering, Electrical & Electronic

Robust Joint Beamforming and Jamming for Secure AF Networks: Low-Complexity Design

Chao Wang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2015)

Article Engineering, Electrical & Electronic

Jamming-Aided Secure Communication in Massive MIMO Rician Channels

Jue Wang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2015)

Article Computer Science, Information Systems

Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints

Frederic Gabry et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2015)