Principles of physical layer security in multiuser wireless networks: A survey
A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …
multiuser wireless networks. The essential premise of physical layer security is to enable the …
An overview of physical layer security in wireless communication systems with CSIT uncertainty
A Hyadi, Z Rezki, MS Alouini - IEEE Access, 2016 - ieeexplore.ieee.org
The concept of physical layer security builds on the pivotal idea of turning the channel's
imperfections, such as noise and fading, into a source of security. This is established …
imperfections, such as noise and fading, into a source of security. This is established …
[كتاب][B] Physical-layer security: from information theory to security engineering
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …
implementation, challenges and benefits of a groundbreaking new model for secure …
Information theoretic security
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
A Mukherjee, AL Swindlehurst - IEEE Transactions on Signal …, 2010 - ieeexplore.ieee.org
In this paper, we investigate methods for reducing the likelihood that a message transmitted
between two multi-antenna nodes is intercepted by an undetected eavesdropper. In …
between two multi-antenna nodes is intercepted by an undetected eavesdropper. In …
MIMO interference alignment over correlated channels with imperfect CSI
B Nosrat-Makouei, JG Andrews… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Interference alignment (IA), given uncorrelated channel components and perfect channel
state information, obtains the maximum degrees of freedom in an interference channel. Little …
state information, obtains the maximum degrees of freedom in an interference channel. Little …
Secrecy rates in broadcast channels with confidential messages and external eavesdroppers
G Geraci, S Singh, JG Andrews, J Yuan… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we consider the broadcast channel with confidential messages and external
eavesdroppers (BCCE), where a multi-antenna base station simultaneously communicates …
eavesdroppers (BCCE), where a multi-antenna base station simultaneously communicates …
Cooperative encoding for secrecy in interference channels
OO Koyluoglu, H El Gamal - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
This paper investigates the fundamental performance limits of the two-user interference
channel in the presence of an external eavesdropper. In this setting, we construct an inner …
channel in the presence of an external eavesdropper. In this setting, we construct an inner …
Multiuser diversity for secrecy communications using opportunistic jammer selection: Secure DoF and jammer scaling law
In this paper, we propose opportunistic jammer selection in a wireless security system for
increasing the secure degrees of freedom (DoF) between a transmitter and a legitimate …
increasing the secure degrees of freedom (DoF) between a transmitter and a legitimate …
Achievable regions and precoder designs for the multiple access wiretap channels with confidential and open messages
This paper investigates the secrecy achievable region of multiple access wiretap (MAC-WT)
channels where, besides confidential messages, the users have also open messages to …
channels where, besides confidential messages, the users have also open messages to …