Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks
This paper investigates the physical layer security of non-orthogonal multiple access
(NOMA) in large-scale networks with invoking stochastic geometry. Both single-antenna and …
(NOMA) in large-scale networks with invoking stochastic geometry. Both single-antenna and …
Secure communications in millimeter wave ad hoc networks
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have
enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are …
enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are …
Secure transmission in MIMO wiretap channels using general-order transmit antenna selection with outdated CSI
In this paper, we propose general-order transmit antenna selection to enhance the secrecy
performance of multiple-input-multiple-output multieavesdropper channels with outdated …
performance of multiple-input-multiple-output multieavesdropper channels with outdated …
Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach
This paper develops a tractable framework for exploiting the potential benefits of physical
layer security in three-tier wireless sensor networks (WSNs) using stochastic geometry. In …
layer security in three-tier wireless sensor networks (WSNs) using stochastic geometry. In …
Physical layer security over fluctuating two-ray fading channels
Ensuring the physical layer security (PHY-security) of millimeter-wave (mmWave)
communications is one of the key factors for the success of 5G. Recent field measurements …
communications is one of the key factors for the success of 5G. Recent field measurements …
Opportunistic relaying for low-altitude UAV swarm secure communications with multiple eavesdroppers
In this study, we investigate the secrecy outage performance achieved by opportunistic
relaying for a low-altitude unmanned aerial vehicle (UAV) swarm secure communication …
relaying for a low-altitude unmanned aerial vehicle (UAV) swarm secure communication …
MGF approach to the analysis of generalized two-ray fading models
We analyze a class of generalized two-ray (GTR) fading channels that consist of two line-of-
sight (LOS) components with random phase plus a diffuse component. We derive a closed …
sight (LOS) components with random phase plus a diffuse component. We derive a closed …
On secrecy performance of antenna-selection-aided MIMO systems against eavesdrop**
In this paper, we consider a multiple-input-multiple-output (MIMO) system consisting of one
source, one destination, and one eavesdropper, where each node is equipped with an …
source, one destination, and one eavesdropper, where each node is equipped with an …
Transmit Antenna Selection in Secure MIMO Systems Over Fading Channels
This paper investigates the secrecy performance of multiple-input multiple-output systems
under generalized α-μ fading conditions. To this end, we focus on two distinct scenarios: 1) …
under generalized α-μ fading conditions. To this end, we focus on two distinct scenarios: 1) …