Modeling and analysis of cellular networks using stochastic geometry: A tutorial

H ElSawy, A Sultan-Salem, MS Alouini… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
This paper presents a tutorial on stochastic geometry (SG)-based analysis for cellular
networks. This tutorial is distinguished by its depth with respect to wireless communication …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

Massive MIMO linear precoding: A survey

N Fatema, G Hua, Y **ang, D Peng… - IEEE systems …, 2017 - ieeexplore.ieee.org
Recently, massive multiple-input multiple-output (MIMO) system has attracted tremendous
research interests in wireless communications. Among various performance aspects and …

Secrecy performance analysis of IRS-aided UAV relay system

W Wang, H Tian, W Ni - IEEE Wireless Communications Letters, 2021 - ieeexplore.ieee.org
In this letter, we study the secrecy performance of an intelligent reflecting surface (IRS)-
aided unmanned aerial vehicle (UAV) relay communication system in the presence of …

Secure and green SWIPT in distributed antenna networks with limited backhaul capacity

DWK Ng, R Schober - IEEE Transactions on Wireless …, 2015 - ieeexplore.ieee.org
This paper studies the resource allocation algorithm design for secure information and
renewable green energy transfer to mobile receivers in distributed antenna communication …

Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers

TX Zheng, HM Wang, J Yuan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we study the secure multi-antenna transmission with artificial noise (AN) under
slow fading channels coexisting with randomly located eavesdroppers. We provide a …

On secure wireless communications for IoT under eavesdropper collusion

Y Zhang, Y Shen, H Wang, J Yong… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Wireless communication is one of the key technologies that actualize the Internet of Things
(IoT) concept into the real world. Understanding the security performance of wireless …

Secrecy transmit beamforming for heterogeneous networks

T Lv, H Gao, S Yang - IEEE Journal on Selected Areas in …, 2015 - ieeexplore.ieee.org
In this paper, we pioneer the study of physical-layer security in heterogeneous networks
(HetNets). We investigate secure communications in a two-tier downlink HetNet, which …

Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers

G Chen, JP Coon, M Di Renzo - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We analyze the secrecy outage probability in the downlink for wireless networks with
spatially (Poisson) distributed eavesdroppers (EDs) under the assumption that the base …

Physical layer security in downlink multi-antenna cellular networks

G Geraci, HS Dhillon, JG Andrews… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
In this paper, we study physical layer security for the downlink of cellular networks, where
the confidential messages transmitted to each mobile user can be eavesdropped by both; 1) …