Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C **ao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …

A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Secure massive MIMO transmission with an active eavesdropper

Y Wu, R Schober, DWK Ng, C **ao… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we investigate secure and reliable transmission strategies for multi-cell multi-
user massive multiple-input multiple-output systems with a multi-antenna active …

Robust and secure resource allocation for full-duplex MISO multicarrier NOMA systems

Y Sun, DWK Ng, J Zhu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we study the resource allocation algorithm design for multiple-input single-
output (MISO) multicarrier non-orthogonal multiple access (MC-NOMA) systems, in which a …

Overview of 5G security technology

X Ji, K Huang, L **, H Tang, C Liu, Z Zhong… - Science China …, 2018 - Springer
The 5th-generation mobile communication system (5G) has higher security requirements
than previous systems. Accordingly, international standard organizations, operators, and …

Robust secure beamforming design for two-user downlink MISO rate-splitting systems

H Fu, S Feng, W Tang, DWK Ng - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we consider max-min fairness for a downlink two-user multi-input single-output
(MISO) system with imperfect channel state information available at transmitter (CSIT) taking …

Multi-objective optimization for robust power efficient and secure full-duplex wireless communication systems

Y Sun, DWK Ng, J Zhu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the power efficient resource allocation algorithm design for
secure multiuser wireless communication systems employing a full-duplex (FD) base station …

Beam-domain anti-jamming transmission for downlink massive MIMO systems: A Stackelberg game perspective

Z Shen, K Xu, X **a - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
In this paper, beam-domain (BD) anti-jamming transmission in a downlink massive multiple-
input multiple-output (MIMO) system is investigated. A smart jammer with multiple antennas …