[1] M. Ragheb, S. M. S. Hemami, A. Kuhestani, D. W. K. Ng and L. Hanzo, “On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach,” IEEE Trans. Inf. Foren. Sec., vol. 17, pp. 53-68, 2022.
[2] M. Tarihi, “A survey on the physical layer security in wirless communication networks”, 4th conference on applicable research on computer engineering and signal processing, Nov. 2016 (in Persian).
[3] C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, p. 656–715, 1949.
[4] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J, vol. 54, no. 8, pp. 1355-1387, 1975.
[5] Y. Oohama, “Coding for Relay Channels with Confidential Messages,” Proceedings 2001 IEEE Information Theory Workshop, 2001.
[6] M. Tatar Mamaghani, A. Kuhestani, and H. Behroozi, “Can a multi-hop link relying on untrusted AF relays render security,” Wireless Net., Jan. 2021.
[7] M. Letafati, A. Kuhestani and H. Behroozi, “Three-Hop Untrusted Relay Networks with Hardware Imperfections and Channel Estimation Errors for Internet of Things,” IEEE Trans. Inf. Foren. Sec., Mar. 2020.
[8] R. G.Braunik, “Compressive Sensing,” IEEE Sigal Process. Mag., 2007.
[9] Y. Zhang, Y. Xiang, L. Y. Zhang, “Secure Wireless Communications Based on Compressive Sensing: A Survey”, IEEE Commun. Surv. Tut., vol. 21, pp. 1093-1111, 2019.
[10] G. Han, X. Fu, Q. Lyu, “Compressed Sensing for Physical Layer Security in Single Relay Cooperative System”, 2019 IEEE International Conference on Signal, Information and Data Processing (ICSIDP);2019.
[11] L. Qing, H. Guangyao and F. Xiaomei, “Physical Layer Security in Multi-Hop AF Relay Network Based on Compressed Sensing,” IEEE Commun. Lett., vol. 22, no. 9, pp. 1882-1885, Sept. 2018.
[12] S. Chang, J. Li, X. Fu, and L. Zhang, “Energy harvesting for physical layer security in cooperative networks based on compressed sensing”, Entropy, vol. 19, no. 9, p. 462, 2017.
[13] R. Dautov and G. R. Tsouri, “Establishing secure measurement matrix for compressed sensing using wireless physical layer security,” in Int. Conf. Comput. Network. Commun. (ICNC), pp. 354–358, 2013.
[14] E. Bjornson, M. Matthaiou and M. Debbah, “A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments,” IEEE Trans. Commun., vol. 61, no. 11, pp. 4512-4525, Nov. 2013.
[15] V. Shahiri, A. Kuhestani and L. Hanzo, “Short-packet AF relaying for the IoT in the face of imperfect channel estimation and hardware impairments,” IEEE Trans. Green Commun. Net., vol. 6, no. 1, pp. 20-36, Mar. 2022.
[16] A. Kuhestani, A. Mohammadi and P. L. Yeoh, “Security-reliability trade-off in cyber-physical cooperative systems with non-ideal untrusted relaying,” in Proc. IEEE 4th World Forum on Internet of Things (WF-IoT), 2018, pp. 552-557.
[17] M. Fatehi, S. A. Mohajeran, J. Jahanshiri, “Investigation and simulation of hardware impairment on physical layer security in IoT Networks in presence of arbitrary number of eavesdroppers,” Electronic and cyber defense Journal, vol. 3, no. 10, 2023 (in Persian).
[18] A. Khalili Tirandaz, A. Kuhestani, “Security Evaluation of the Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications,” Electronic and cyber defense Journal, vol. 10, no. 2, 2022 (in Persian).
[19] M. Bloch, J. Barros, M. R. D. Rodrigues and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
[20] L. Sun and Q. Du, “A review of physical layer security techniques for Internet of Things: Challenges and solutions,” Entropy, vol. 20, no. 10, p. 730, 2018