Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

Intelligent reflecting surface: A programmable wireless environment for physical layer security

J Chen, YC Liang, Y Pei, H Guo - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we introduce an intelligent reflecting surface (IRS) to provide a programmable
wireless environment for physical layer security. By adjusting the reflecting coefficients, the …

Enabling secure wireless communications via intelligent reflecting surfaces

X Yu, D Xu, R Schober - 2019 IEEE Global Communications …, 2019 - ieeexplore.ieee.org
In this paper, we propose to utilize intelligent reflecting surfaces (IRSs) for enhancing the
physical layer security of wireless communications systems. In particular, an IRS-assisted …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

Improving wireless physical layer security via cooperating relays

L Dong, Z Han, AP Petropulu… - IEEE transactions on …, 2009 - ieeexplore.ieee.org
Physical (PHY) layer security approaches for wireless communications can prevent
eavesdrop** without upper layer data encryption. However, they are hampered by …

Secure transmission with multiple antennas—Part II: The MIMOME wiretap channel

A Khisti, GW Wornell - IEEE Transactions on Information …, 2010 - ieeexplore.ieee.org
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple
antennas at the sender, intended receiver and eavesdropper. The associated channel …

Secrecy wireless information and power transfer with MISO beamforming

L Liu, R Zhang, KC Chua - IEEE Transactions on Signal …, 2014 - ieeexplore.ieee.org
The dual use of radio signal for simultaneous wireless information and power transfer
(SWIPT) has recently drawn significant attention. To meet the practical requirement that the …

Improving physical layer secrecy using full-duplex jamming receivers

G Zheng, I Krikidis, J Li, AP Petropulu… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper studies secrecy rate optimization in a wireless network with a single-antenna
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …

The secrecy capacity of the MIMO wiretap channel

F Oggier, B Hassibi - IEEE Transactions on Information Theory, 2011 - ieeexplore.ieee.org
We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the
transmitter sends some confidential information to one user which is a legitimate receiver …