Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

Breaking spectrum gridlock with cognitive radios: An information theoretic perspective

A Goldsmith, SA Jafar, I Maric… - Proceedings of the …, 2009 - ieeexplore.ieee.org
Cognitive radios hold tremendous promise for increasing spectral efficiency in wireless
systems. This paper surveys the fundamental capacity limits and associated transmission …

[KNJIGA][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

Physical layer security in cognitive radio inspired NOMA network

Z **ang, W Yang, G Pan, Y Cai… - IEEE Journal of Selected …, 2019 - ieeexplore.ieee.org
This paper investigates physical layer security (PLS) in cognitive radio inspired non-
orthogonal multiple access (CR-NOMA) networks with multiple primary and secondary …

[KNJIGA][B] Information theory: coding theorems for discrete memoryless systems

I Csiszár, J Körner - 2011 - books.google.com
Csiszár and Körner's book is widely regarded as a classic in the field of information theory,
providing deep insights and expert treatment of the key theoretical issues. It includes in …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009 - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

Secure communication over fading channels

Y Liang, HV Poor, S Shamai - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
The fading broadcast channel with confidential messages (BCC) is investigated, where a
source node has common information for two receivers (receivers 1 and 2), and has …

Wireless physical layer security

HV Poor, RF Schaefer - Proceedings of the National Academy of Sciences, 2017 - pnas.org
Security in wireless networks has traditionally been considered to be an issue to be
addressed separately from the physical radio transmission aspects of wireless systems …

A survey of security challenges in cognitive radio networks: Solutions and future research directions

A Attar, H Tang, AV Vasilakos, FR Yu… - Proceedings of the …, 2012 - ieeexplore.ieee.org
In this survey, we present a comprehensive list of major known security threats within a
cognitive radio network (CRN) framework. We classify attack techniques based on the type …

Wireless physical-layer security: Lessons learned from information theory

A Yener, S Ulukus - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
Physical-layer security utilizes resources of the transmission medium to guarantee secure
communication against an adversary with unlimited computational power. Rooted in …