Secure Transmission for Uplink SCMA Systems Over κ-μ Fading Channels
Sparse code multiple access (SCMA) is an interesting proposal for supporting massive machine-type communications (mMTC) in future mobile networks. In this use […]
Malicious RIS Versus Massive MIMO: Securing Multiple Access Against RIS-Based Jamming Attacks
In this letter, we study an attack that leverages a reconfigurable intelligent surface (RIS) to induce harmful interference toward multiple users in […]
A multi-armed bandit framework for efficient UAV-based cooperative jamming coverage
In this paper, the position control of multiple unmanned aerial vehicles, acting as cooperative jammers, is proposed to improve the security level […]
Secure Beamforming in Multi-User Multi-IRS Millimeter Wave Systems
We study the secrecy rate maximization problem in a millimeter wave (mmWave) network, consisting of a base station (BS), multiple intelligent reflecting […]
6G Security Challenges and Potential Solutions
Although the fifth generation wireless networks are yet to be fully investigated, the vision and key elements of the 6th generation (6G) […]
Impact of Wireless Energy Transfer Strategies on the Secrecy Performance of Untrustworthy Relay Networks
This work investigates the secrecy outage performance of a dual-hop relaying network with an untrustworthy energy-constrained amplify-and-forward relay. A destination-based jamming technique […]
Impact of Self-Energy Recycling and Cooperative Jamming on SWIPT-Based FD Relay Networks With Secrecy Constraints
This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and power transfer cooperative relay network in the presence […]
Imperfect jamming cancellation on NOMA networks with randomly located eavesdroppers
This paper addresses the secrecy performance of the downlink of a non-orthogonal multiple access network in the presence of multiple randomly located […]
Secure Hybrid RF/VLC under Statistical Queuing Constraints
This paper evaluates the effective capacity and maximum average arrival rate of a hybrid radio frequency (RF) and visible light communication (VLC) […]
Weighted secrecy coverage analysis and the impact of friendly jamming over UAV-Enabled Networks
In 5G and beyond networks, Unmanned Aerial Vehicles (UAV) are an attractive solution to enhance the secrecy of a wireless systems by […]