A multi-armed bandit framework for efficient UAV-based cooperative jamming coverage
In this paper, the position control of multiple unmanned aerial vehicles, acting as cooperative jammers, is proposed to improve the security level […]
Secure Beamforming in Multi-User Multi-IRS Millimeter Wave Systems
We study the secrecy rate maximization problem in a millimeter wave (mmWave) network, consisting of a base station (BS), multiple intelligent reflecting […]
6G Security Challenges and Potential Solutions
Although the fifth generation wireless networks are yet to be fully investigated, the vision and key elements of the 6th generation (6G) […]
Impact of Wireless Energy Transfer Strategies on the Secrecy Performance of Untrustworthy Relay Networks
This work investigates the secrecy outage performance of a dual-hop relaying network with an untrustworthy energy-constrained amplify-and-forward relay. A destination-based jamming technique […]
Impact of Self-Energy Recycling and Cooperative Jamming on SWIPT-Based FD Relay Networks With Secrecy Constraints
This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and power transfer cooperative relay network in the presence […]
Imperfect jamming cancellation on NOMA networks with randomly located eavesdroppers
This paper addresses the secrecy performance of the downlink of a non-orthogonal multiple access network in the presence of multiple randomly located […]
Secure Hybrid RF/VLC under Statistical Queuing Constraints
This paper evaluates the effective capacity and maximum average arrival rate of a hybrid radio frequency (RF) and visible light communication (VLC) […]
Weighted secrecy coverage analysis and the impact of friendly jamming over UAV-Enabled Networks
In 5G and beyond networks, Unmanned Aerial Vehicles (UAV) are an attractive solution to enhance the secrecy of a wireless systems by […]
Information-Theoretic Security of MIMO Networks Under kappa-mu Shadowed Fading Channels
This paper investigates the impact of realistic propagation conditions on the achievable secrecy performance of multiple-input multiple-output systems in the presence of […]
The Roadmap to 6G Security and Privacy
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems […]