[1] H. Ning, F. Farha, Z. N. Mohammad & M. Daneshmand, "A Survey and Tutorial on “Connection Exploding Meets Efficient Communication” in the Internet of Things," in IEEE Internet of Things Journal, vol. 7, no. 11, pp. 10733-10744, Nov. 2020.
[2] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal & B. Sikdar, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," in IEEE Access, vol. 7, pp. 82721-82743, 2019.
[3] C. H. Liao, H. -H. Shuai & L. C. Wang, "Eavesdropping prevention for heterogeneous Internet of Things systems," 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1-2, 2018.
[4] S. A. Mohajeran & G. A. Hodtani, "Power Allocation for Wireless Sensor Networks in the Presence of Non-Gaussian Noise and Hardware Impairments Using Distance-Related Bounds," in IEEE Sensors Letters, vol. 5, no. 4, pp. 1-4, April 2021.
[5] G. Ding, X. Gao, Z. Xue, Y. Wu & Q. Shi, ”Massive MIMO for Distributed Detection With Transceiver Impairments,” in IEEE Transactions on Vehicular Technology, vol. 67, no. 1, pp. 604-617, Jan. 2018.
[6] C. Mollén, U. Gustavsson, T. Eriksson & E. G. Larsson, "Impact of Spatial Filtering on Distortion From Low-Noise Amplifiers in Massive MIMO Base Stations," in IEEE Transactions on Communications, vol. 66, no. 12, pp. 6050-6067, Dec. 2018
[7] P. Williams, P. Rojas & M. Bayoumi, "Security Taxonomy in IoT – A Survey," 2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 560-565, 2019.
[8] N. Sklavos & I. D. Zaharakis, "Cryptography and Security in Internet of Things (IoTs): Models, Schemes, and Implementations," 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1-2, 2016.
[9] J. Zhang, S. Rajendran, Z. Sun, R. Woods & L. Hanzo, "Physical Layer Security for the Internet of Things: Authentication and Key Generation," in IEEE Wireless Communications, vol. 26, no. 5, pp. 92-98, October 2019.
[10] Y. Chen, W. Li & H. Shu, "Wireless physical-layer security with multiple receivers and eavesdroppers: Outage probability and average secrecy capacity," 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 662-667, 2015.
[11] M. Obeed & W. Mesbah, "An efficient physical layer security algorithm for two-way relay systems," 2016 IEEE Wireless Communications and Networking Conference, pp. 1-6, 2016.
[12] A. Sonee & G. A. Hodtani, "On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side Information," in IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp. 1151-1166, June 2015.
[13] Y. Liang, H. V. Poor & S. Shamai, “Information Theoretic Security, Delft,” The Netherlands: Now Publishers, 2009.
[14] T. Cover, & J. Thomas, “Elements of Information Theory,” 2nd Edition, Wiley, (2006).
[15] T. T. Duy & V. N. Q. Bao, "Performance analysis of cooperativebased multi-hop transmission protocols in underlay cognitive radio with hardware impairment," VNU Journal of Computer Science and Communication Engineering, vol. 31, no. 2, pp. 15-28, 2015.
[16] J. Mo, M. Tao, & Y. Liu, "Relay placement for physical layer security: A secure connection perspective," IEEE Commun. Lett., vol. 16, no. 6, pp. 878-881, Jun. 2012.
[17] V. N. Q. Bao, N. L. Trung, & M. Debbah, "Relay selection schemes for dual-hop networks under security constraints witb multiple eavesdroppers," IEEE Trans. Wire!' Commun., vol. 12, no. 12, pp. 6076-6085, Otc. 2013.