Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014‏ - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

An overview of physical layer security in wireless communication systems with CSIT uncertainty

A Hyadi, Z Rezki, MS Alouini - IEEE Access, 2016‏ - ieeexplore.ieee.org
The concept of physical layer security builds on the pivotal idea of turning the channel's
imperfections, such as noise and fading, into a source of security. This is established …

[كتاب][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011‏ - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009‏ - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

Robust beamforming for security in MIMO wiretap channels with imperfect CSI

A Mukherjee, AL Swindlehurst - IEEE Transactions on Signal …, 2010‏ - ieeexplore.ieee.org
In this paper, we investigate methods for reducing the likelihood that a message transmitted
between two multi-antenna nodes is intercepted by an undetected eavesdropper. In …

MIMO interference alignment over correlated channels with imperfect CSI

B Nosrat-Makouei, JG Andrews… - IEEE Transactions on …, 2011‏ - ieeexplore.ieee.org
Interference alignment (IA), given uncorrelated channel components and perfect channel
state information, obtains the maximum degrees of freedom in an interference channel. Little …

Secrecy rates in broadcast channels with confidential messages and external eavesdroppers

G Geraci, S Singh, JG Andrews, J Yuan… - IEEE Transactions on …, 2014‏ - ieeexplore.ieee.org
In this paper, we consider the broadcast channel with confidential messages and external
eavesdroppers (BCCE), where a multi-antenna base station simultaneously communicates …

Cooperative encoding for secrecy in interference channels

OO Koyluoglu, H El Gamal - IEEE Transactions on Information …, 2011‏ - ieeexplore.ieee.org
This paper investigates the fundamental performance limits of the two-user interference
channel in the presence of an external eavesdropper. In this setting, we construct an inner …

Multiuser diversity for secrecy communications using opportunistic jammer selection: Secure DoF and jammer scaling law

JH Lee, W Choi - IEEE Transactions on Signal Processing, 2013‏ - ieeexplore.ieee.org
In this paper, we propose opportunistic jammer selection in a wireless security system for
increasing the secure degrees of freedom (DoF) between a transmitter and a legitimate …

Achievable regions and precoder designs for the multiple access wiretap channels with confidential and open messages

H Xu, T Yang, KK Wong, G Caire - IEEE Journal on Selected …, 2022‏ - ieeexplore.ieee.org
This paper investigates the secrecy achievable region of multiple access wiretap (MAC-WT)
channels where, besides confidential messages, the users have also open messages to …