Skip to main content
This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers... more
    • by 
    •   22  
      Information TechnologyInformation SecuritySecurityDesign Research
We study the problem of physical layer security in massive multiple-input multiple-output (MaMIMO) cognitive radio networks (CRNs). In particular, we investigate the design of a smart jamming attack on the uplink transmission of a CRN in... more
    • by 
    •   7  
      Cognitive Radio NetworksConvex OptimizationEnergy efficiencyPhysical layer security
Long range wide area network (LoRaWAN) is one of the most widely used low power wide area (LPWA) network technologies in the unlicensed ISM bands. LoRaWAN adopts chirp spread spectrum (CSS) based physical layer specification which is... more
    • by 
    •   10  
      LTE physical layerPhysical Layer Network CodingImplementation of Adaptive Modulation and Coding Technique using Matlab Part I: Physical Layer DesignPhysical Layer
Secrecy capacity is a fundamental informationtheoretic performance metric to predict the maximum data rate of reliable communication, while the intended message is not revealed to the eavesdropper. Motivated by this consideration, in this... more
    • by 
    •   3  
      MIMO SystemsFading ChannelPhysical layer security
    • by 
    •   18  
      Computer ScienceDistributed ComputingA Priori KnowledgeCommon Knowledge
In this letter, the system performance of the DF full-duplex (FD) relaying communication network is investigated with physical layer security (PLS). In this system model, the source (S) and the destination (D) communicate via a helping... more
    • by 
    •   5  
      Monte CarloIPPhysical layer securityRelaying Networks
In this work, we take on the role of a wireless adversary and investigate one of its most powerful tools---radio frequency jamming. Although different jammer designs are discussed in the literature, reactive jamming, i.e., targeting only... more
    • by 
    •   11  
      Electrical EngineeringComputer ScienceCommunicationWireless Communications
In this paper, a novel secure data transmission method called interference signal superposition-aided multiple-input multiple-output with antenna number modulation and adaptive antenna selection (ISS-MIMO-ANM-AAS) is presented to defend... more
    • by 
    •   11  
      Wireless CommunicationsNetwork SecurityElectronics & Telecommunication EngineeringComputer Security
Encryption is the process of encoding messages in such a way, that they can only be decoded by the intended receiver. On the other hand, physical-layer (PHY) security exploits channel characteristics, such as noise and multipath fading,... more
    • by 
    •   9  
      Information TheoryWireless CommunicationsError Correction CodingInformation Theory and coding
LTE is an emerging wireless communication technology to provide high-speed data service for the mobile phones and data terminals. To improve indoor coverage and capacity Femtocells are included in 3GPP since Release 8. There is no common... more
    • by 
    •   57  
      Wireless CommunicationsLong Term Evolution (LTE)LTEWireless technology (3G & LTE)
In this paper, we investigate the reliability and security performance of cooperative multi-relay systems, where both source and relay nodes are energy-constrained nonlinear energy harvesters, scavenging energy from a power beacon nearby.... more
    • by 
    •   3  
      Physical layer securityRF Energy HarvestingHardware Impairment
Even though the wireless network of 5G has not been investigated exhaustively, the sixth generation (6G) echo systems' visionaries are already being debated. Therefore, to solidify and consolidate privacy and security within 6G networks,... more
    • by 
    •   5  
      Computer ScienceQuantum ComputingComputer SecurityPhysical layer security
The secrecy outage performance of wireless communication systems operating over spatially correlated composite fading channels is analyzed in this paper. We adopt a multiplicative composite channel model for both the legitimate... more
    • by  and +1
    •   7  
      Physical layer securityNakagami-m channelsShadowingNakagami-m
This paper investigates the physical layer security of non-orthogonal multiple access (NOMA) in large-scale networks with invoking stochastic geometry. Both single-antenna and multiple-antenna aided transmission scenarios are considered,... more
    • by  and +1
    •   3  
      Physical layer securityStochastic GeometryNon-Orthogonal Multiple Access
We investigate the physical layer (PHY) security of a system with a base-station (BS), a legitimate user, and an eavesdropper, whose exact location is unknown but within a ring-shaped area around the BS. To this end, we present novel... more
    • by  and +2
    •   3  
      CommunicationWireless CommunicationsPhysical layer security
    • by 
    •   4  
      Wireless CommunicationsBeamformingPhysical layer securityArtificial Nose
With the current technology revolution, underwater wireless sensor networks (UWSNs) find several applications such as disaster prevention, water quality monitoring, military surveillance and fish farming. Nevertheless, this kind of... more
    • by 
    •   19  
      AcousticsCommunicationSensors and SensingAntennas & Radio Wave Propagation
In this paper proposes security issues and its solution for WiMAX network. Jamming and Scrambling is main security issues regarding Physical Layer. The lack of Physical infrastructure of wireless networks is... more
    • by 
    •   7  
      SecurityWimaxPhysical layer securitySecurity Attacks in Manets
This paper presents a secure beamforming design to prevent eavesdropping on multiple-input multiple-output (MIMO) device-to-device (D2D) communication. The devices communicate via a trusted relay which performs physical layer network... more
    • by 
    •   4  
      MIMO SystemsPhysical layer securityDevice-to-Device CommunicationWireless Relay Networks
The future wireless communication systems demand much more enhanced security and reliability compared to currently deployed systems. In this work, we propose a much simpler yet more efficient physical layer security (PLS) technique for... more
    • by 
    •   11  
      Wireless CommunicationsOrthogonal Frequency Division Multiplexing (OFDM)Wireless networksTransmission
This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks using stochastic geometry. In such networks, the sensing data from the remote sensors are... more
    • by  and +1
    •   3  
      Wireless Sensor NetworksPhysical layer securityStochastic Geometry
A cooperative jamming protocol is studied in this paper and its ability to protect the communications of a pair of users in the presence of an eavesdropper. Communication of users is assisted by many helping interferers, assuming... more
    • by  and +1
    •   5  
      Wireless networksCooperative TransmissionPhysical layer securityCooperative Jamming
The future wireless communication systems demand much more enhanced security and reliability compared to currently deployed systems. In this work, we propose a much simpler yet more efficient physical layer security (PLS) technique for... more
    • by  and +1
    •   9  
      Computer ScienceWireless CommunicationsWireless networksTransmission
The future wireless communication systems demand enhanced security and reliability than the current systems. In this work, we propose a more simple yet efficient physical layer security (PLS) technique for achieving reliable and secure... more
    • by 
    •   11  
      Wireless CommunicationsCommunication NetworksWireless networksPhysical layer security
The concept of intelligent transportation systems (ITS) is considered to be a highly promising area of research due to its diversity of unique features. It is based mainly on the wireless vehicular network (WVN), where vehicles can... more
    • by  and +1
    •   4  
      Vehicular CommunicationPhysical layer securityEavesdroppingartificial noise
Order statistics have attracted the interest of the research community since they find numerous applications in several areas of the communications and signal processing fields. This paper introduces an approximate, yet accurate, approach... more
    • by  and +1
    • Physical layer security
The technological innovation has enabled the spread of safety-related systems in many domains, such as public transport, energy, and medical devices. In these applications, security is one of the primary concerns. This paper proposes a... more
    • by  and +3
    •   4  
      SecurityDigital Signal ProcessingWatermarkingPhysical layer security
—In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons... more
    • by 
    •   6  
      Cognitive Radio NetworksCooperative CommunicationPhysical layer securityStochastic Geometry
    • by  and +1
    •   2  
      Network SecurityPhysical layer security
—We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks, where multiple non-colluding eavesdroppers attempt to intercept the... more
    • by 
    •   3  
      Wireless Sensor NetworksPhysical layer securityStochastic Geometry
As the latest member of the multiple access family, non-orthogonal multiple access (NOMA) has been recently proposed for 3GPP Long Term Evolution (LTE) and envisioned to be an essential component of 5th generation (5G) mobile networks.... more
    • by 
    •   5  
      Cognitive Radio NetworksPhysical layer securityStochastic GeometryWireless Power Transfer
Considering the advancements of the internet of things (IoT) in 6G and beyond communications , data transmission security in IoT devices has received extensive interest because of their significant features, such as low computational... more
    • by 
    •   10  
      Wireless CommunicationsMulti Antenna Multiple Access TechniquesNext Generation NetworksPhysical layer security
This paper studies the secrecy rate maximization problem of a secure wireless communication system, in the presence of multiple eavesdroppers. The security of the communication link is enhanced through cooperative jamming, with the help... more
    • by  and +1
    •   4  
      Cooperative CommunicationPhysical layer securityWireless Physical Layer SecurityCooperative Jamming
This paper studies secrecy transmission with the aid of a group of wireless energy harvesting (WEH)-enabled amplify-and-forward (AF) relays performing cooperative jamming (CJ) and relaying. The source node in the network does simultaneous... more
    • by  and +1
    •   3  
      Cooperative CommunicationPhysical layer securitySimultaneous Wireless Information and Energy Transfer
We consider the multiple-input multiple-output (MIMO) wiretap channel under a minimum receiver-side power constraint in addition to the usual maximum transmitter-side power constraint. This problem is motivated by energy harvesting... more
    • by 
    •   2  
      Wireless energy transferPhysical layer security
    • by 
    •   2  
      Underwater Acoustic CommunicationsPhysical layer security
Securing wireless sensor networks (WSNs) is a hard problem. In particular, network access control is notoriously difficult to achieve due to the inherent broadcast characteristics of wireless communications: an attacker can easily target... more
    • by 
    •   5  
      Wireless CommunicationsWireless Sensor NetworksWireless Sensor Network SecurityPhysical layer security
This paper studies the use of multi-antenna harvest-and-jam (HJ) helpers in a multi-antenna amplify-and-forward (AF) relay wiretap channel assuming that the direct link between the source and destination is broken. Our objective is to... more
    • by  and +1
    •   4  
      Robust optimizationCooperative CommunicationPhysical layer securitySimultaneous Wireless Information and Energy Transfer
    • by 
    •   5  
      Wireless CommunicationsWireless networksPhysical layer securityKey generation
In this work, to overcome the flaws of standard chaotic maps we generated two new cascaded structures, 3D Cubic-Sine and 2D Cubic-Cat chaotic parametric maps, based on a new parameter-varied Cubic map that enhance the chaos complexity and... more
    • by 
    •   9  
      Information SystemsComputer ScienceEncryptionSteganography
In this work, to overcome the flaws of standard chaotic maps we generated two new cascaded structures, 3D Cubic-Sine and 2D Cubic-Cat chaotic parametric maps, based on a new parameter-varied Cubic map that enhance the chaos complexity and... more
    • by 
    •   9  
      Orthogonal Frequency Division Multiplexing (OFDM)EncryptionSteganographyModulation techniques
We focus on a scenario where two wireless source nodes wish to exchange confidential information via an RF energy harvesting untrusted two-way relay. Despite its cooperation in forwarding the information, the relay is considered untrusted... more
    • by 
    •   4  
      Information SecurityEnergy HarvestingPhysical layer securityWireless Relay Networks
—The broadcast nature of the wireless medium allows unintended users to eavesdrop the confidential information transmission. In this regard, we investigate the problem of secure communication between a source and a destination via a... more
    • by 
    •   9  
      Information SecurityCognitive Radio NetworksCognitive radioEnergy Harvesting
Wireless communications are increasingly important in health-care applications, particularly in those that use implantable medical devices (IMDs). Such systems have many advantages in providing remote healthcare in terms of monitoring,... more
    • by 
    •   5  
      Wireless CommunicationsWireless Body Area Network (WBAN)Physical layer securityWireless Communication Security
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and compromise necessitate the use of an on-line key generation,... more
    • by 
    •   3  
      Wireless Sensor NetworksPhysical layer securityKey generation
    • by 
    •   20  
      Distributed ComputingSecurityA Priori KnowledgeCommon Knowledge
—Dynamic charging technology will enable moving electrical vehicles (EVs) to charge their batteries through magnetic induction by charging pads (CPs) placed on a portion of the roadbed. To realize such as system, the EVs need to... more
    • by  and +1
    •   5  
      SecurityElectric VehiclesData PrivacyPhysical layer security
We analyze the secrecy outage performance of a mixed radio frequency-free space optical (RF-FSO) transmission system with imperfect channel state information (CSI). We deal with a single-input multiple-output (SIMO) wiretap model, where a... more
    • by 
    • Physical layer security
—We evaluate and quantify the joint effect of fading and multiple interferers on the physical-layer (PHY) security of a system consisted of a base-station (BS), a legitimate user, and an eavesdropper. To this end, we present a novel... more
    • by  and +3
    •   2  
      Wireless CommunicationsPhysical layer security
Recent advances in spectrum access technologies, such as cognitive radios, have made spectrum sharing a viable option for addressing the spectrum shortage problem. However , these advances have also contributed to the increased... more
    • by 
    •   2  
      Spectrum trading, secondary use of spectrum, wireless communicationsPhysical layer security