Secure mmWave MIMO Networks Employing Hybrid Active-Passive RIS
By combining the benefits of passive reflecting and active relay, the hybrid active-passive reconfigurable intelligent surfaces (RIS) (HRIS) architecture can overcome the […]
Analysis and Simulation of Precoding and User Association for Securing Hybrid RF/VLC Systems
To overcome the limitations of visible light communication (VLC) systems while benefiting from high data rates and inherently secure transmissions, hybrid systems […]
Strategic Deployment of Swarm of UAVs for Secure IoT Networks
Security provisioning for low-complex and constrained devices in the Internet of Things (IoT) is exacerbating the concerns for the design of future […]
Malicious RIS Versus Massive MIMO: Securing Multiple Access Against RIS-Based Jamming Attacks
In this letter, we study an attack that leverages a reconfigurable intelligent surface (RIS) to induce harmful interference toward multiple users in […]
Secure Transmission for Uplink SCMA Systems Over κ-μ Fading Channels
Sparse code multiple access (SCMA) is an interesting proposal for supporting massive machine-type communications (mMTC) in future mobile networks. In this use […]
A multi-armed bandit framework for efficient UAV-based cooperative jamming coverage
In this paper, the position control of multiple unmanned aerial vehicles, acting as cooperative jammers, is proposed to improve the security level […]
Secure Beamforming in Multi-User Multi-IRS Millimeter Wave Systems
We study the secrecy rate maximization problem in a millimeter wave (mmWave) network, consisting of a base station (BS), multiple intelligent reflecting […]
6G Security Challenges and Potential Solutions
Although the fifth generation wireless networks are yet to be fully investigated, the vision and key elements of the 6th generation (6G) […]
Impact of Wireless Energy Transfer Strategies on the Secrecy Performance of Untrustworthy Relay Networks
This work investigates the secrecy outage performance of a dual-hop relaying network with an untrustworthy energy-constrained amplify-and-forward relay. A destination-based jamming technique […]
Impact of Self-Energy Recycling and Cooperative Jamming on SWIPT-Based FD Relay Networks With Secrecy Constraints
This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and power transfer cooperative relay network in the presence […]