
This letter investigates the physical layer security in a wireless
cooperative network where communication is assisted by a fullduplex (FD)
untrusted relay in the presence of multiple external eavesdroppers. A
clusterbased colluding eavesdropping setting is considered, where illegitimate
nodes with common interests are grouped in a cluster. In order to confuse the
different eavesdropping clusters, we consider artificialnoiseaided
beamforming at the source node. Moreover, FD relay jamming is adopted to
improve the system's security. To maintain secure communications against the
untrusted relay node, a FD destination jamming scheme is adopted. Our proposed
scheme is designed based on the channel state information of the legitimate
nodes only. Numerical results show that the optimal power allocation factor
between data and artificial noise depends on the total number of antennas of
the different colluding eavesdropping clusters.

We investigate the physical layer security of wireless singleinput
singleoutput orthogonaldivision multiplexing (OFDM) when a transmitter, which
we refer to as Alice, sends her information to a receiver, which we refer to as
Bob, in the presence of an eavesdropping node, Eve. To prevent information
leakage, Alice sends an artificialnoise (AN) signal superimposed over her
information signal. We investigate the impact of the channel delay spread, OFDM
cyclic prefix, information/AN power allocation, and information and AN
precoders design on the achievable average secrecy rate. We consider the two
cases of known and unknown channel state information (CSI) at Alice.
Furthermore, we compare both cases of persubchannel processing and joint
subchannels processing at Eve's receiver. Our numerical results show the gain
of AN injection in terms of average secrecy rate for different OFDM operating
conditions. Moreover, based on our new insights, we demonstrate that the
ANaided scheme is effective and achieves almost the same average secrecy rate
as the fullCSI case without the need for Eve's instantaneous CSI at Alice.

We propose a new scheme to enhance the physicallayer security of wireless
singleinput singleoutput orthogonalfrequency divisionmultiplexing (OFDM)
transmissions from an electric vehicle, Alice, to the aggregator, Bob, in the
presence of an eavesdropper, Eve. To prevent information leakage to Eve, Alice
exploits the wireless channel randomness to extract secret key symbols that are
used to encrypt some data symbols which are then multiplexed in the frequency
domain with the remaining unencrypted data symbols. To secure the unencrypted
data symbols, Alice transmits an artificialnoise (AN) signal superimposed over
her data signal. We propose a threelevel optimization procedure to increase
the average secrecy rate of this wiretap channel by optimizing the transmit
power allocation between the encrypted data symbols, unencrypted data symbols
and the AN symbols. Our numerical results show that the proposed scheme
achieves considerable secrecy rate gains compared to the benchmark cases

Security is a critical issue in full duplex (FD) communication systems due to
the broadcast nature of wireless channels. In this paper, joint design of
information and artificial noise beamforming vectors is proposed for the FD
simultaneous wireless information and power transferring (FDSWIPT) systems
with loopback selfinterference cancellation. To guarantee high security and
energy harvesting performance of the FDSWIPT system, the proposed design is
formulated as a secrecy rate maximization problem under energy transfer rate
constraints. Although the secrecy rate maximization problem is nonconvex, we
solve it via semidefinite relaxation and a twodimensional search. We prove the
optimality of our proposed algorithm and demonstrate its performance via
simulations.

Physical layer security is a key issue in the full duplex (FD) communication
systems due to the broadcast nature of wireless channels. In this paper, the
joint design of information and artificial noise beamforming vectors is
proposed for the FD simultaneous wireless information and power transferring
(FDSWIPT) systems. To guarantee high security and energy harvesting
performance of the FDSWIPT system, the proposed design is formulated as a sum
information transmission rate (SITR) maximization problem under
informationleakage and energy constraints. In addition, we consider the
fairness issue between the uplink and downlink information transmission rates
by formulating a \mbox{fairnessaware} SITRmaximization problem. Although the
formulated \mbox{SITRmaximization} and \mbox{fairnessaware}
\mbox{SITRmaximization} problems are nonconvex, we solve them via
semidefinite relaxation and onedimensional search. The optimality of our
proposed algorithms is theoretically proved, and the computation complexities
are established. Moreover, we propose two suboptimal solutions to the
formulated optimization problems. In terms of the SITRmaximization problem,
numerical results show that the performance achieved by one of the two
suboptimal algorithms is close to the performance of the optimal algorithm with
increasing maximum transmission power of the FDBST.

We propose a new onebit feedback scheme with scheduling decision based on
the maximum expected weighted rate. We show the concavity of the $2$user case
and provide the optimal solution which achieves the maximum weighted rate of
the users. For the general asymmetric Muser case, we provide a heuristic
method to achieve the maximum expected weighted rate. We show that the sum rate
of our proposed scheme is very close to the sum rate of the full channel state
information case, which is the upper bound performance.

We derive closedform expressions for the achievable rates of a bufferaided
fullduplex (FD) multipleinput multipleoutput (MIMO) Gaussian relay channel.
The FD relay still suffers from residual selfinterference (RSI) after the
application of selfinterference mitigation techniques. We investigate both
cases of a slowRSI channel where the RSI is fixed over the entire codeword,
and a fastRSI channel where the RSI changes from one symbol duration to
another within the codeword. We show that the RSI can be completely eliminated
in the slowRSI case when the FD relay is equipped with a buffer while the fast
RSI cannot be eliminated. For the fixedrate data transmission scenario, we
derive the optimal transmission strategy that should be adopted by the source
node and relay node to maximize the system throughput. We verify our analytical
findings through simulations.

This paper investigates artificial noise injection into the temporal and
spatial dimensions of a legitimate wireless communication system to secure its
transmissions from potential eavesdropping. We consider a multipleinput
singleoutput (MISO) orthogonal frequency division multiplexing (OFDM) system
in the presence of a singleantenna passive eavesdropper and derive both the
secrecy rate and average secrecy rate of the legitimate system. It is assumed
that the legitimate transmitter knows the full channel information of the
legitimate transceivers but does not know the instantaneous channel state
information of the passive eavesdropper. Closedform expressions for the
secrecy rate and average secrecy rate are derived for the asymptotic case with
a large number of transmit antennas. We also investigate 1) the power
allocation between the data and the AN; 2) the power allocation between the
spatial and the temporal AN. Computer simulations are carried out to evaluate
the performance of our proposed artificial noise scheme.

We assume that a bufferaided transmitter communicates with a receiving node
in the presence of an attacker. We investigate the impact of a radiofrequency
energyharvesting attacker that probabilistically operates as a jammer or an
eavesdropper. We show that even without the need for an external energy source,
the attacker can still degrade the security of the legitimate system. We show
that the random data arrival behavior at the transmitter and the channel
randomness of the legitimate link can improve the system's security. Moreover,
we design a jamming scheme for the attacker and investigate its impact on the
secure throughput of the legitimate system. The attacker designs his power
splitting parameter and jamming/eavesdropping probability based on the energy
state of the attacker's battery to minimize the secure throughput of the
legitimate system.

This paper proposes a new scheme to secure the transmissions in an untrusted
decodeandforward (DF) relaying network. A legitimate source node, Alice,
sends her data to a legitimate destination node, Bob, with the aid of an
untrusted DF relay node, Charlie. To secure the transmissions from Charlie
during relaying time slots, each data codeword is secured using a secretkey
codeword that has been previously shared between Alice and Bob during the
perfectly secured time slots (i.e., when the channel secrecy rate is positive).
The secretkey bits exchanged between Alice and Bob are stored in a
finitelength buffer and are used to secure data transmission whenever needed.
We model the secretkey buffer as a queueing system and analyze its Markov
chain. Our numerical results show the gains of our proposed scheme relative to
benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure
throughput.

We propose a simple yet efficient scheme for a set of energyharvesting
sensors to establish secure communication with a common destination (a master
node). An eavesdropper attempts to decode the data sent from the sensors to
their common destination. We assume a single modulation scheme that can be
implemented efficiently for energylimited applications. We design a
multipleaccess scheme for the sensors under secrecy and limitedenergy
constraints. In a given time slot, each energyharvesting sensor chooses
between sending its packet or remaining idle. The destination assigns a set of
data time slots to each sensor. The optimization problem is formulated to
maximize the secrecy sumthroughput.

We investigate joint information and energy cooperative schemes in a
slottedtime cognitive radio network with a primary transmitterreceiver pair
and a set of secondary transmitterreceiver pairs. The primary transmitter is
assumed to be an energyharvesting node. We propose a threestage cooperative
transmission protocol. During the first stage, the primary user releases a
portion of its time slot to the secondary nodes to send their data and to power
the energyharvesting primary transmitter from the secondary radiofrequency
signals. During the second stage, the primary transmitter sends its data to its
destination and to the secondary nodes. During the third stage, the secondary
nodes amplify and forward the primary data. We propose five different schemes
for secondary access and powering the primary transmitter. We derive
closedform expressions for the primary and secondary rates for all the
proposed schemes. Two of the proposed schemes use distributed beamforming to
power the primary transmitter. We design a sparsityaware relayselection
scheme based on the compressive sensing principles. Our numerical results
demonstrate the gains of our proposed schemes for both the primary and
secondary systems.

We propose a new artificialnoise aided hybrid timeswitching/powersplitting
scheme for orthogonal frequencydivision multiplexing (OFDM) systems to
securely transmit data and transfer energy to a legitimate receiving node. In
our proposed scheme, the cyclic prefix has two more benefits in addition to the
cancellation of the intersymbol interference between the OFDM blocks. Firstly,
it enables the legitimate transmitter to send artificialnoise (AN) vectors in
a way such that the interference can be canceled at the legitimate receiver
prior to information decoding. Secondly, its power is used to energize the
legitimate receiver. We optimize the cyclic prefix length, the timeswitching
and powersplitting parameters, and the power allocation ratio between the data
and AN signals at the legitimate transmitter to maximize the average secrecy
rate subject to a constraint on the average energy transfer rate at the
legitimate receiver. Our numerical results demonstrate that our proposed scheme
can achieve up to 23% average secrecy rate gain relative to a pure
powersplitting scheme.

This letter proposes a novel hybrid half/fullduplex relaying scheme to
enhance the relay channel security. A source node (Alice) communicates with her
destination node (Bob) in the presence of a bufferaided fullduplex relay node
(Rooney) and a potential eavesdropper (Eve). Rooney adopts two different
relaying strategies, namely randomizeandforward and decodeandforward
relaying strategies, to improve the security of the legitimate system. In the
first relaying strategy, Rooney uses a codebook different from that used at
Alice. In the second relaying strategy, Rooney and Alice use the same
codebooks. In addition, Rooney switches between halfduplex and fullduplex
modes to further enhance the security of the legitimate system. The numerical
results demonstrate that our proposed scheme achieves a significant average
secrecy endtoend throughput improvement relative to the conventional
bufferless fullduplex relaying scheme.

In this letter, we investigate the security of a singleantenna rechargeable
source node in the presence of a multiantenna rechargeable cooperative jammer
and a potential singleantenna eavesdropper. The batteries at the legitimate
transmitting nodes (i.e. the source node and the jamming node) are assumed to
be limited in capacity and are modeled as queueing systems. We investigate the
impact of the energy arrival rates at the batteries on the achievable secrecy
rates. In our energyconstrained network, we propose an efficient scheme to
enhance the system's security by optimizing the transmission times of the
source node. The jammer uses a subset of its antennas (and transmit
radiofrequency chains) to create a beamformer which maximizes the system's
secrecy rate while completely canceling the artificial noise at the legitimate
destination. Our numerical results demonstrate the significant average secrecy
rate gain of our proposed scheme.

We consider a relayassisted wireless network, where the energyharvesting
bufferaided relay node is powered by radiofrequency signals from a source
node wishing to communicate with its destination. We propose two secure
cooperative protocols for a network composed of a source node equipped with a
data buffer communicating with its destination in the presence of a
bufferaided relay node and an eavesdropper. Our proposed protocols are
designed based on the channel state information and the buffer state
information at the source and relay nodes. The burstiness of data at the source
node queue (buffer) and the energy recycling process at the relay are taken
into account in our analysis. In addition, we take the decoding and signal
processing circuit power consumption constraints into consideration. For the
limiting case of an infinitesize battery at the relay, we derive a sufficient
condition for the energy queue to saturate. Our numerical results demonstrate
the throughput gains of our proposed protocols.

This paper proposes efficient multipleaccess schemes for large wireless
networks based on the transmitters' buffer state information and their
transceivers' duplex transmission capability. First, we investigate the case of
halfduplex nodes where a node can either transmit or receive in a given time
instant. The network is said to be naturally sparse if the number of
nonemptyqueue transmitters in a given frame is much smaller than the number of
users, which is the case when the arrival rates to the queues are very small
and the number of users is large. If the network is not naturally sparse, we
design the user requests to be sparse such that only few requests are sent to
the destination. We refer to the detected nonemptyqueue transmitters in a
given frame as frame owners. Our design goal is to minimize the nodes' total
transmit power in a given frame. In the case of unslottedtime data
transmission, the optimization problem is shown to be a convex optimization
program. We propose an approximate formulation to simplify the problem and
obtain a closedform expression for the assigned time durations to the nodes.
The solution of the approximate optimization problem demonstrates that the time
duration assigned to a node in the set of frame owners is the ratio of the
squareroot of the buffer occupancy of that node to the sum of the squareroots
of each occupancy of all the frame owners. We then investigate the slottedtime
data transmission scenario, where the time durations assigned for data
transmission are slotted. In addition, we show that the fullduplex capability
of a node increases the data transmission portion of the frame and enables a
distributed implementation of the proposed schemes.

This letter studies a timeslotted multipleaccess system with a primary user
(PU) and a secondary user (SU) sharing the same channel resource. We propose a
novel secondary access protocol which alleviates sensing errors and detects the
availability of primary channels with the highest ability of detection. Under
the proposed protocol, the SU may access the channel at one of a predefined
instants within the time slot each of which associated with a certain access
probability that changes based on the sensing outcome. There is also a
possibility of accessing the channel at the beginning of the time slot without
channel sensing. The optimization problem is stated such that the secondary
throughput is maximized under stability of the primary queue and a constraint
on the primary queueing delay. Numerical results demonstrate the beneficial
gains of the proposed protocol in terms of secondary throughput.

This paper investigates the maximum throughput for a rechargeable secondary
user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable
power supply. The SU maintains a finite energy queue and harvests energy from
natural resources, e.g., solar, wind and acoustic noise. We propose a
probabilistic access strategy by the SU based on the number of packets at its
energy queue. We investigate the effect of the energy arrival rate, the amount
of energy per energy packet, and the capacity of the energy queue on the SU
throughput under fading channels. Results reveal that the proposed access
strategy can enhance the performance of the SU.

This paper investigates the maximum secondary throughput for a rechargeable
secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a
reliable power supply. The SU maintains a finite energy queue and harvests
energy from natural resources and primary radio frequency (RF) transmissions.
We propose a power allocation policy at the PU and analyze its effect on the
throughput of both the PU and SU. Furthermore, we study the impact of the
bursty arrivals at the PU on the energy harvested by the SU from RF
transmissions. Moreover, we investigate the impact of the rate of energy
harvesting from natural resources on the SU throughput. We assume fading
channels and compute exact closedform expressions for the energy harvested by
the SU under fading. Results reveal that the proposed power allocation policy
along with the implemented RF energy harvesting at the SU enhance the
throughput of both primary and secondary links.

In this paper, we consider a cognitive scenario where an energy harvesting
secondary user (SU) shares the spectrum with a primary user (PU). The secondary
source helps the primary source in delivering its undelivered packets during
periods of silence of the primary source. The primary source has a queue for
storing its data packets, whereas the secondary source has two data queues; a
queue for storing its own packets and the other for storing the fraction of the
undelivered primary packets accepted for relaying. The secondary source is
assumed to be a batterybased node which harvests energy packets from the
environment. In addition to its data queues, the SU has an energy queue to
store the harvested energy packets. The secondary energy packets are used for
primary packets decoding and data packets transmission. More specifically, if
the secondary energy queue is empty, the secondary source can neither help the
primary source nor transmit a packet from the data queues. The energy queue is
modeled as a discrete time queue with Markov arrival and service processes. Due
to the interaction of the queues, we provide inner and outer bounds on the
stability region of the proposed system. We investigate the impact of the
energy arrival rate on the stability region. Numerical results show the
significant gain of cooperation.

In this work, we study the problem of band allocation of $M_s$ buffered
secondary users (SUs) to $M_p$ primary bands licensed to (owned by) $M_p$
buffered primary users (PUs). The bands are assigned to SUs in an orthogonal
(onetoone) fashion such that neither band sharing nor multiband allocations
are permitted. In order to study the stability region of the secondary network,
the optimization problem used to obtain the stability region's envelope
(closure) is established and is shown to be a linear program which can be
solved efficiently and reliably. We compare our orthogonal allocation system
with two typical lowcomplexity and intuitive band allocation systems. In one
system, each cognitive user chooses a band randomly in each time slot with some
assignment probability designed such that the system maintained stable, while
in the other system fixed (deterministic) band assignment is adopted throughout
the lifetime of the network. We derive the stability regions of these two
systems. We prove mathematically, as well as through numerical results, the
advantages of our proposed orthogonal system over the other two systems.

This paper considers a network in which a primary user (PU) may cooperate
with a cognitive radio (CR) user for transmission of its data packets. The PU
is assumed to be a buffered terminal operating in a timeslotted fashion. We
develop two protocols which involve cooperation between primary and secondary
users. To satisfy certain quality of service requirements, users share time
slot duration and frequency bandwidth. Moreover, the secondary user (SU) may
leverage the primary feedback signal. The proposed protocols are designed such
that the secondary rate is maximized and the primary queueing delay is
maintained less than the queueing delay in case of noncooperative PU. In
addition, the proposed protocols guarantee the stability of the primary queue
and maintain the average energy emitted by the CR user below a certain value.
The proposed protocols also provide more robust and potentially continuous
service for SUs compared to the conventional practice in cognitive networks
where SUs transmit in the spectrum holes and silence sessions of the PUs. We
include primary source burstiness, sensing errors, and feedback reception
errors to the analysis of the proposed cooperative cognitive protocols.
Numerical results show the beneficial gains of the cooperative protocols in
terms of secondary rate and primary throughput, queueing delay, and average
energy savings.

In this paper, we propose a cognitive protocol that involves cooperation
between the primary and secondary users. In addition to its own queue, the
secondary user (SU) has a queue to store, and then relay, the undelivered
primary packets. When the primary queue is nonempty, the SU remains idle and
attempts to decode the primary packet. When the primary queue is empty, the SU
splits the total channel bandwidth into two orthogonal subbands and assigns
each to a queue probabilistically. We show the advantage of the proposed
protocol over the prioritized cognitive relaying (PCR) protocol in which the SU
assigns a priority in transmission to the primary packets over its own packets.
We present two problem formulations, one based on throughput and the other on
delay. Both optimization problems are shown to be linear programs for a given
bandwidth assignment. Numerical results demonstrate the benefits of the
proposed protocol.

In this paper, we propose a new optimizationbased access strategy of
multipacket reception (MPR) channel for multiple secondary users (SUs)
accessing the primary user (PU) spectrum opportunistically. We devise an
analytical model that realizes the multipacket access strategy of SUs that
maximizes the throughput of individual backlogged SUs subject to queue
stability of the PU. All the network receiving nodes have MPR capability. We
aim at maximizing the throughput of the individual SUs such that the PU's queue
is maintained stable. Moreover, we are interested in providing an
energyefficient cognitive scheme. Therefore, we include energy constraints on
the PU and SU average transmitted energy to the optimization problem. Each SU
accesses the medium with certain probability that depends on the PU's activity,
i.e., active or inactive. The numerical results show the advantage in terms of
SU throughput of the proposed scheme over the conventional access scheme, where
the SUs access the channel randomly with fixed power when the PU is sensed to
be idle.