Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
A survey on multiple-antenna techniques for physical layer security
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …
widely recognized as a promising way to enhance wireless security by exploiting the …
A survey of physical layer security techniques for 5G wireless networks and challenges ahead
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …
theoretic approaches has received significant research interest recently. The key idea …
A comprehensive survey on cooperative relaying and jamming strategies for physical layer security
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …
conventional cryptographic schemes for securing wireless links. Many studies have shown …
Secure massive MIMO transmission with an active eavesdropper
In this paper, we investigate secure and reliable transmission strategies for multi-cell multi-
user massive multiple-input multiple-output systems with a multi-antenna active …
user massive multiple-input multiple-output systems with a multi-antenna active …
Robust and secure resource allocation for full-duplex MISO multicarrier NOMA systems
In this paper, we study the resource allocation algorithm design for multiple-input single-
output (MISO) multicarrier non-orthogonal multiple access (MC-NOMA) systems, in which a …
output (MISO) multicarrier non-orthogonal multiple access (MC-NOMA) systems, in which a …
Overview of 5G security technology
X Ji, K Huang, L **, H Tang, C Liu, Z Zhong… - Science China …, 2018 - Springer
The 5th-generation mobile communication system (5G) has higher security requirements
than previous systems. Accordingly, international standard organizations, operators, and …
than previous systems. Accordingly, international standard organizations, operators, and …
Robust secure beamforming design for two-user downlink MISO rate-splitting systems
H Fu, S Feng, W Tang, DWK Ng - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we consider max-min fairness for a downlink two-user multi-input single-output
(MISO) system with imperfect channel state information available at transmitter (CSIT) taking …
(MISO) system with imperfect channel state information available at transmitter (CSIT) taking …
Multi-objective optimization for robust power efficient and secure full-duplex wireless communication systems
In this paper, we investigate the power efficient resource allocation algorithm design for
secure multiuser wireless communication systems employing a full-duplex (FD) base station …
secure multiuser wireless communication systems employing a full-duplex (FD) base station …
Beam-domain anti-jamming transmission for downlink massive MIMO systems: A Stackelberg game perspective
Z Shen, K Xu, X **a - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
In this paper, beam-domain (BD) anti-jamming transmission in a downlink massive multiple-
input multiple-output (MIMO) system is investigated. A smart jammer with multiple antennas …
input multiple-output (MIMO) system is investigated. A smart jammer with multiple antennas …