{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T02:26:46Z","timestamp":1771036006756,"version":"3.50.1"},"reference-count":110,"publisher":"EDP Sciences","license":[{"start":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:00:00Z","timestamp":1658448000000},"content-version":"vor","delay-in-days":202,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Safety","S&amp;S"],"accepted":{"date-parts":[[2022,3,31]]},"published-print":{"date-parts":[[2022]]},"abstract":"<jats:p>The broadcast nature of wireless communication systems makes wireless transmission extremely susceptible to eavesdropping and even malicious interference. Physical layer security technology can effectively protect the private information sent by the transmitter from being listened to by illegal eavesdroppers, thus ensuring the privacy and security of communication between the transmitter and legitimate users. Thus, the main design goal of physical layer security is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper using well-designed transmission schemes. The development of mobile communication presents new challenges to physical layer security research. This paper provides a survey of the physical layer security research on various promising mobile technologies from secure key generation and keyless techniques, including secure key generation, directional modulation (DM), spatial modulation (SM), covert communication, and intelligent reflecting surface (IRS)-aided communication. Finally, the future topics and the unresolved technical challenges are presented in physical layer security for mobile communications.<\/jats:p>","DOI":"10.1051\/sands\/2022007","type":"journal-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T07:55:45Z","timestamp":1658735745000},"page":"2022007","source":"Crossref","is-referenced-by-count":13,"title":["Physical layer security techniques for data transmission for future wireless networks"],"prefix":"10.1051","volume":"1","author":[{"given":"Weiping","family":"Shi","sequence":"first","affiliation":[]},{"given":"Xinyi","family":"Jiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8803-9951","authenticated-orcid":false,"given":"Jinsong","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6037-5259","authenticated-orcid":false,"given":"Abdeldime Mohamed Salih","family":"Abdelgader","sequence":"additional","affiliation":[]},{"given":"Yin","family":"Teng","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hangjia","family":"He","sequence":"additional","affiliation":[]},{"given":"Rongen","family":"Dong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0073-1965","authenticated-orcid":false,"given":"Feng","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Jiangzhou","family":"Wang","sequence":"additional","affiliation":[]}],"member":"250","published-online":{"date-parts":[[2022,7,22]]},"reference":[{"key":"R1","doi-asserted-by":"crossref","first-page":"2734","DOI":"10.1109\/TCOMM.2009.10.0800122","volume":"57","author":"Zhu","year":"2009","journal-title":"IEEE Trans Commun"},{"key":"R2","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1109\/TCOMM.2011.112811.110036","volume":"60","author":"Zhu","year":"2012","journal-title":"IEEE Trans Commun"},{"key":"R3","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1109\/JSAC.2012.120502","volume":"30","author":"Wang","year":"2012","journal-title":"IEEE J Sel Areas Commun"},{"key":"R4","doi-asserted-by":"crossref","first-page":"718","DOI":"10.1109\/TCOMM.2005.844962","volume":"53","author":"Zhou","year":"2005","journal-title":"IEEE Trans Commun"},{"key":"R5","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/JSAC.2014.141208","volume":"32","author":"Zhou","year":"2014","journal-title":"IEEE J Sel Areas Commun"},{"key":"R6","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","volume":"36","author":"Wu","year":"2018","journal-title":"IEEE J Sel Areas Commun"},{"key":"R7","unstructured":"Abdeldime MA and Wu L. The physical layer of the IEEE 802.11p wave communication standard: The specifications and challenges. In: Proc. World Congr. Eng. Comput. Sci. (WCECS), Vol. 2, San Francisco, CA, USA, Oct. 2014, 22-4."},{"key":"R8","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1109\/COMST.2016.2633387","volume":"19","author":"Chen","year":"2017","journal-title":"IEEE Commun Surv Tutor"},{"key":"R9","doi-asserted-by":"crossref","first-page":"4766","DOI":"10.1109\/TWC.2018.2831217","volume":"17","author":"Hu","year":"2018","journal-title":"IEEE Trans Wirel Commun"},{"key":"R10","doi-asserted-by":"crossref","first-page":"1751","DOI":"10.1109\/JSAC.2013.130909","volume":"31","author":"Chou","year":"2013","journal-title":"IEEE J Sel Areas Commun"},{"key":"R11","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"Csiszar","year":"1978","journal-title":"IEEE Trans Inf Theory"},{"key":"R12","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"Leung-Yan-Cheong","year":"1978","journal-title":"IEEE Trans Inf Theory"},{"key":"R13","doi-asserted-by":"crossref","first-page":"1878","DOI":"10.1109\/COMST.2018.2883144","volume":"21","author":"Wang","year":"2019","journal-title":"IEEE Commun Surv Tutor"},{"key":"R14","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"Leung-Yan-Cheong","year":"1978","journal-title":"IEEE Trans Inf Theory"},{"key":"R15","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1109\/TIFS.2011.2159206","volume":"61","author":"Wang","year":"2011","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"R16","doi-asserted-by":"crossref","first-page":"2572","DOI":"10.1109\/TVT.2012.2199145","volume":"61","author":"Ng","year":"2012","journal-title":"IEEE Trans Veh Technol"},{"key":"R17","doi-asserted-by":"crossref","first-page":"5428","DOI":"10.1109\/TSP.2011.2162956","volume":"59","author":"Jeong","year":"2011","journal-title":"IEEE Trans Signal Process"},{"key":"R18","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"Goel","year":"2008","journal-title":"IEEE Trans Wirel Commun"},{"key":"R19","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1109\/COMST.2018.2878035","volume":"21","author":"Hamamreh","year":"2018","journal-title":"IEEE Commun Surv Tutor"},{"key":"R20","doi-asserted-by":"crossref","unstructured":"Abdelgader AMS and Wu L. A secret key extraction technique applied in vehicular networks. In: Proc. IEEE 17th Int. Conf. Comput. Sci. Eng., 2014, 1396\u20131403.","DOI":"10.1109\/CSE.2014.264"},{"key":"R21","doi-asserted-by":"crossref","first-page":"2259","DOI":"10.1109\/TAP.2010.2046854","volume":"58","author":"Daly","year":"2010","journal-title":"IEEE Trans Antennas Propag"},{"key":"R22","doi-asserted-by":"crossref","first-page":"2228","DOI":"10.1109\/TVT.2007.912136","volume":"57","author":"Mesleh","year":"2008","journal-title":"IEEE Trans Veh Technol"},{"key":"R23","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MCOM.001.1900107","volume":"58","author":"Wu","year":"2020","journal-title":"IEEE Commun Mag"},{"key":"R24","doi-asserted-by":"crossref","unstructured":"Yuliana M. A simple secret key generation by using a combination of pre-processing method with a multilevel quantization. Entropy 2019; 21: 192.","DOI":"10.3390\/e21020192"},{"key":"R25","doi-asserted-by":"crossref","first-page":"937","DOI":"10.1109\/LCOMM.2014.2318306","volume":"18","author":"Kim","year":"2014","journal-title":"IEEE Commun Lett"},{"key":"R26","first-page":"361","volume":"6","author":"Bhatia","year":"2013","journal-title":"Int J Adv Eng Technol"},{"key":"R27","first-page":"39","volume":"16","author":"Abdelgader","year":"2018","journal-title":"Int J Intell Transp Syst Res"},{"key":"R28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2541289","volume":"11","author":"Premnath","year":"2014","journal-title":"ACM Trans Sens Netw (TOSN)"},{"key":"R29","doi-asserted-by":"crossref","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"Mukherjee","year":"2014","journal-title":"IEEE Commun Surv Tutor"},{"key":"R30","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1109\/TVT.2021.3057661","volume":"70","author":"Gong","year":"2021","journal-title":"IEEE Trans Veh Technol"},{"key":"R31","doi-asserted-by":"crossref","first-page":"1616","DOI":"10.1109\/TWC.2013.122313.131118","volume":"13","author":"Wang","year":"2014","journal-title":"IEEE Trans Wirel Commun"},{"key":"R32","first-page":"249","volume":"2","author":"Bang","year":"2013","journal-title":"Int J Appl Innov Eng Manag (IJAIEM)"},{"key":"R33","doi-asserted-by":"crossref","first-page":"606","DOI":"10.4236\/wsn.2010.28072","volume":"28","author":"Xu","year":"2010","journal-title":"Wirel Sens Netw"},{"key":"R34","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"Bennett","year":"1992","journal-title":"J Cryptol"},{"key":"R35","unstructured":"Greenemeier L. Election Fix? Switzerland Tests Quantum Cryptography. Scientific American, Swiss, 2007."},{"key":"R36","first-page":"321","volume":"Vol. 12","author":"Jana","year":"2009","journal-title":"Proc. ACM MobiCom, Beijing, China"},{"key":"R37","doi-asserted-by":"crossref","first-page":"822","DOI":"10.1109\/TIT.2003.809563","volume":"49","author":"Maurer","year":"2003","journal-title":"IEEE Trans Inf Theory"},{"key":"R38","doi-asserted-by":"crossref","unstructured":"Lai L, Liang Y and Poor H. Key agreement over wireless fading channels with an active attacker. In: Proc. 48th Allerton Conf. Communication, Control, Computing, Monticello, IL, Sept. 2010, 1391\u201396.","DOI":"10.1109\/ALLERTON.2010.5707076"},{"key":"R39","doi-asserted-by":"crossref","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"Mukherjee","year":"2014","journal-title":"IEEE Commun Surv Tutor"},{"key":"R40","doi-asserted-by":"crossref","first-page":"138406","DOI":"10.1109\/ACCESS.2020.3012006","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"R41","doi-asserted-by":"crossref","unstructured":"Ali IAI, Weibin Z and Zeng Z et al. An Adaptive Lossly Quantization Technique for Key Extraction Applied in Vehicular Communication. Wireless Personal Communications 2022: 1\u201317.","DOI":"10.21203\/rs.3.rs-671868\/v1"},{"key":"R42","doi-asserted-by":"crossref","unstructured":"Mathur S, Trappe W and Mandayam N et al. Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel. In: Proc. 14th Annu. Int. Conf. Mobile Comput. Netw., San Francisco, CA, USA, Sept. 2008, 128\u201339.","DOI":"10.1145\/1409944.1409960"},{"key":"R43","first-page":"69","volume":"11","author":"Abdelgader","year":"2016","journal-title":"J Netw"},{"key":"R44","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MWC.2017.1500365WC","volume":"24","author":"Rezki","year":"2017","journal-title":"IEEE Wirel Commun"},{"key":"R45","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1109\/ACCESS.2016.2521718","volume":"4","author":"Zhang","year":"2016","journal-title":"IEEE Access"},{"key":"R46","doi-asserted-by":"crossref","first-page":"138406","DOI":"10.1109\/ACCESS.2020.3012006","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"R47","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MCOM.2015.7120014","volume":"53","author":"Zeng","year":"2015","journal-title":"IEEE Commun Mag"},{"key":"R48","doi-asserted-by":"crossref","first-page":"2065","DOI":"10.1109\/TMC.2016.2557784","volume":"16","author":"Zhu","year":"2016","journal-title":"IEEE Trans Mob Comput"},{"key":"R49","first-page":"142","volume":"11","author":"Shu","year":"2016","journal-title":"IET Commun"},{"key":"R50","doi-asserted-by":"crossref","first-page":"2674","DOI":"10.1109\/JSSC.2008.2004864","volume":"43","author":"Babakhani","year":"2008","journal-title":"IEEE J Solid-State Circ"},{"key":"R51","doi-asserted-by":"crossref","first-page":"2633","DOI":"10.1109\/TAP.2009.2027047","volume":"57","author":"Daly","year":"2009","journal-title":"IEEE Trans Antennas Propag"},{"key":"R52","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.1109\/TAP.2010.2044357","volume":"58","author":"Daly","year":"2010","journal-title":"IEEE Trans Antennas Propag"},{"key":"R53","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1109\/LAWP.2011.2178384","volume":"10","author":"Hong","year":"2011","journal-title":"IEEE Antennas Wirel Propag Lett"},{"key":"R54","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1109\/LAWP.2021.3056962","volume":"20","author":"Huang","year":"2021","journal-title":"IEEE Antennas Wirel Propag Lett"},{"key":"R55","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1109\/TAP.2013.2287001","volume":"62","author":"Ding","year":"2014","journal-title":"IEEE Trans. Antennas Propag"},{"key":"R56","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1109\/LAWP.2015.2404818","volume":"14","author":"Ding","year":"2015","journal-title":"IEEE Antennas Wirel Propag Lett"},{"key":"R57","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/LAWP.2015.2459752","volume":"15","author":"Ding","year":"2016","journal-title":"IEEE Antennas Wirel Propag Lett"},{"key":"R58","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1109\/LCOMM.2016.2550022","volume":"20","author":"Hu","year":"2016","journal-title":"IEEE Commun Lett"},{"key":"R59","doi-asserted-by":"crossref","first-page":"6614","DOI":"10.1109\/ACCESS.2016.2614825","volume":"4","author":"Shu","year":"2016","journal-title":"IEEE Access"},{"key":"R60","doi-asserted-by":"crossref","first-page":"3775","DOI":"10.1109\/JSYST.2017.2764142","volume":"12","author":"Shu","year":"2018","journal-title":"IEEE Syst J"},{"key":"R61","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/JSAC.2018.2824231","volume":"36","author":"Shu","year":"2018","journal-title":"IEEE J Sel Areas Commun"},{"key":"R62","doi-asserted-by":"crossref","first-page":"1272","DOI":"10.1109\/29.1655","volume":"36","author":"Hung","year":"1988","journal-title":"IEEE Trans Acoust Speech Signal Process"},{"key":"R63","doi-asserted-by":"crossref","first-page":"2179","DOI":"10.1109\/78.950774","volume":"49","author":"di Claudio","year":"2001","journal-title":"IEEE Trans Signal Process"},{"key":"R64","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/TSP.2004.838934","volume":"53","author":"Ng","year":"2005","journal-title":"IEEE Trans Signal Process"},{"key":"R65","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1109\/LCOMM.2013.012213.122650","volume":"17","author":"Rajashekar","year":"2013","journal-title":"IEEE Commun Lett"},{"key":"R66","doi-asserted-by":"crossref","first-page":"8969","DOI":"10.1109\/TVT.2018.2844401","volume":"67","author":"Shu","year":"2018","journal-title":"IEEE Trans Veh Technol"},{"key":"R67","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1109\/TGCN.2019.2898442","volume":"3","author":"Xia","year":"2019","journal-title":"IEEE Trans Green Commun Net"},{"key":"R68","doi-asserted-by":"crossref","first-page":"4643","DOI":"10.1109\/TWC.2020.2985968","volume":"19","author":"Xia","year":"2020","journal-title":"IEEE Trans Wirel Commun"},{"key":"R69","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"Goel","year":"2008","journal-title":"IEEE Trans Wirel Commun"},{"key":"R70","doi-asserted-by":"crossref","first-page":"1351","DOI":"10.1109\/LCOMM.2015.2440353","volume":"19","author":"Wang","year":"2015","journal-title":"IEEE Commun Lett"},{"key":"R71","doi-asserted-by":"crossref","first-page":"5164","DOI":"10.1109\/TVT.2019.2905765","volume":"68","author":"Shu","year":"2019","journal-title":"IEEE Trans Veh Technol"},{"key":"R72","doi-asserted-by":"crossref","first-page":"3869","DOI":"10.1109\/JSYST.2019.2918168","volume":"13","author":"Xia","year":"2019","journal-title":"IEEE Syst J"},{"key":"R73","unstructured":"Shu F, Liu L and Yang L et al. Spatial modulation: An attractive secure solution to future wireless network, 2021. https:\/\/arxiv.org\/abs\/2103.04051."},{"key":"R74","doi-asserted-by":"crossref","unstructured":"Choi J. Full-duplexing jamming attack for active eavesdropping. In: 2016 6th ICITCS, 2016, 1\u20135.","DOI":"10.1109\/ICITCS.2016.7740338"},{"key":"R75","doi-asserted-by":"crossref","first-page":"1962","DOI":"10.1109\/TVT.2021.3051974","volume":"70","author":"Jiang","year":"2021","journal-title":"IEEE Trans Veh Technol"},{"key":"R76","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/JSTSP.2016.2523903","volume":"10","author":"Yu","year":"2016","journal-title":"IEEE J Sel Topics Signal Process"},{"key":"R77","doi-asserted-by":"crossref","first-page":"1903","DOI":"10.1109\/TWC.2020.3037217","volume":"20","author":"Shu","year":"2021","journal-title":"IEEE Trans Wirel Commun"},{"key":"R78","doi-asserted-by":"crossref","first-page":"2570","DOI":"10.1109\/TCOMM.2020.3045221","volume":"69","author":"Xia","year":"2021","journal-title":"IEEE Trans Commun"},{"key":"R79","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/LCOMM.2020.3030697","volume":"25","author":"Yang","year":"2021","journal-title":"IEEE Commun Lett"},{"key":"R80","doi-asserted-by":"crossref","unstructured":"Weeks GD, Townsend JK and Freebersyer JA. A method and metric for quantitatively defining low probability of detection. In: Proc. IEEE Military Commun. Conf. (MILCOM), Vol. 3, Dublin, Ireland, Oct. 1998, 821\u20136.","DOI":"10.1109\/MILCOM.1998.726938"},{"key":"R81","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCOM.2015.7355562","volume":"53","author":"Bash","year":"2015","journal-title":"IEEE Commun Mag"},{"key":"R82","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MWC.001.1900057","volume":"26","author":"Yan","year":"2019","journal-title":"IEEE Wirel Commun"},{"key":"R83","doi-asserted-by":"crossref","first-page":"1921","DOI":"10.1109\/JSAC.2013.130923","volume":"31","author":"Bash","year":"2013","journal-title":"IEEE J Sel Areas Commun"},{"key":"R84","doi-asserted-by":"crossref","first-page":"4089","DOI":"10.1109\/TWC.2019.2920961","volume":"18","author":"Hu","year":"2019","journal-title":"IEEE Trans Wirel Commun"},{"key":"R85","doi-asserted-by":"crossref","first-page":"6313","DOI":"10.1109\/JIOT.2021.3051694","volume":"8","author":"Gao","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"R86","doi-asserted-by":"crossref","first-page":"3656","DOI":"10.1109\/TWC.2018.2812881","volume":"17","author":"Sheikholeslami","year":"2018","journal-title":"IEEE Trans Wirel Commun"},{"key":"R87","doi-asserted-by":"crossref","first-page":"8517","DOI":"10.1109\/TWC.2018.2878014","volume":"17","author":"Shahzad","year":"2018","journal-title":"IEEE Trans Wirel Commun"},{"key":"R88","doi-asserted-by":"crossref","first-page":"12135","DOI":"10.1109\/TVT.2019.2949304","volume":"68","author":"Hu","year":"2019","journal-title":"IEEE Trans Veh Technol"},{"key":"R89","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1109\/LWC.2019.2894617","volume":"8","author":"Shu","year":"2019","journal-title":"IEEE Wirel Commun Lett"},{"key":"R90","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/MWC.001.2000454","volume":"28","author":"Jiang","year":"2021","journal-title":"IEEE Wirel Commun"},{"key":"R91","doi-asserted-by":"crossref","first-page":"4276","DOI":"10.1109\/TSP.2019.2928949","volume":"67","author":"Zhou","year":"2019","journal-title":"IEEE Trans Signal Process"},{"key":"R92","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1109\/TCOMM.2019.2950940","volume":"68","author":"Wang","year":"2020","journal-title":"IEEE Trans Commun"},{"key":"R93","doi-asserted-by":"crossref","first-page":"1080","DOI":"10.1109\/TVT.2019.2950450","volume":"69","author":"Hu","year":"2020","journal-title":"IEEE Trans Veh Technol"},{"key":"R94","doi-asserted-by":"crossref","first-page":"1410","DOI":"10.1109\/LWC.2019.2919685","volume":"8","author":"Cui","year":"2019","journal-title":"IEEE Wirel Commun Lett"},{"key":"R95","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.1109\/LCOMM.2019.2924214","volume":"23","author":"Shen","year":"2019","journal-title":"IEEE Commun Lett"},{"key":"R96","doi-asserted-by":"crossref","unstructured":"Yu X, Xu D and Schober R. Enabling secure wireless communications via intelligent reflecting surfaces. In: Proc. IEEE Global Commun. Conf. (GLOBECOM), Waikoloa, HI, USA, 2019, 1\u20136.","DOI":"10.1109\/GLOBECOM38437.2019.9014322"},{"key":"R97","doi-asserted-by":"crossref","first-page":"82599","DOI":"10.1109\/ACCESS.2019.2924034","volume":"7","author":"Chen","year":"2019","journal-title":"IEEE Access"},{"key":"R98","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1109\/LWC.2020.2969629","volume":"9","author":"Guan","year":"2020","journal-title":"IEEE Wirel Commun Lett"},{"key":"R99","doi-asserted-by":"crossref","unstructured":"Xu D, Yu X and Sun Y et al. Resource allocation for secure IRS-assisted multiuser MISO systems. In: IEEE Globecom Workshops (GC Wkshps), 2019, 1\u20136.","DOI":"10.1109\/GCWkshps45667.2019.9024490"},{"key":"R100","doi-asserted-by":"crossref","first-page":"39","DOI":"10.23919\/JCC.2021.03.004","volume":"18","author":"Shi","year":"2021","journal-title":"China Commun"},{"key":"R101","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1109\/LCOMM.2020.3043475","volume":"25","author":"Shi","year":"2020","journal-title":"IEEE Commun Lett"},{"key":"R102","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1109\/TWC.2021.3098099","volume":"21","author":"Zhou","year":"2022","journal-title":"IEEE Trans Wirel Commun"},{"key":"R103","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1109\/LWC.2020.2969664","volume":"9","author":"Dong","year":"2020","journal-title":"IEEE Wirel Commun Lett"},{"key":"R104","doi-asserted-by":"crossref","first-page":"86659","DOI":"10.1109\/ACCESS.2020.2992613","volume":"8","author":"Jiang","year":"2020","journal-title":"IEEE Access"},{"key":"R105","doi-asserted-by":"crossref","first-page":"7851","DOI":"10.1109\/TCOMM.2020.3024621","volume":"68","author":"Hong","year":"2020","journal-title":"IEEE Trans Commun"},{"key":"R106","doi-asserted-by":"crossref","first-page":"8388","DOI":"10.1109\/TCOMM.2021.3110598","volume":"69","author":"Shu","year":"2021","journal-title":"IEEE Trans Commun"},{"key":"R107","doi-asserted-by":"crossref","first-page":"192132","DOI":"10.1109\/ACCESS.2020.3032759","volume":"8","author":"Hehao","year":"2020","journal-title":"IEEE Access"},{"key":"R108","doi-asserted-by":"crossref","first-page":"2068","DOI":"10.1109\/LWC.2020.3012664","volume":"9","author":"Lu","year":"2020","journal-title":"IEEE Wirel Commun Lett"},{"key":"R109","doi-asserted-by":"crossref","first-page":"2637","DOI":"10.1109\/JSAC.2020.3007043","volume":"38","author":"Yu","year":"2020","journal-title":"IEEE J Sel Areas Commun"},{"key":"R110","doi-asserted-by":"crossref","first-page":"2487","DOI":"10.1109\/TWC.2020.3042828","volume":"20","author":"Hong","year":"2020","journal-title":"IEEE Trans Wirel Commun"}],"container-title":["Security and Safety"],"original-title":[],"link":[{"URL":"https:\/\/sands.edpsciences.org\/10.1051\/sands\/2022007\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T20:11:23Z","timestamp":1727640683000},"score":1,"resource":{"primary":{"URL":"https:\/\/sands.edpsciences.org\/10.1051\/sands\/2022007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":110,"alternative-id":["sands20210003"],"URL":"https:\/\/doi.org\/10.1051\/sands\/2022007","relation":{},"ISSN":["2826-1275"],"issn-type":[{"value":"2826-1275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}