A survey on multiple-antenna techniques for physical layer security
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …
widely recognized as a promising way to enhance wireless security by exploiting the …
Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches
This article provides an overview of the signal processing techniques used to enhance
secrecy in the physical layer of multiantenna wireless communication systems. Motivated by …
secrecy in the physical layer of multiantenna wireless communication systems. Motivated by …
A survey of physical layer security techniques for 5G wireless networks and challenges ahead
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …
theoretic approaches has received significant research interest recently. The key idea …
Securing UAV communications via joint trajectory and power control
Unmanned aerial vehicle (UAV) communication is anticipated to be widely applied in the
forthcoming fifth-generation wireless networks, due to its many advantages such as low cost …
forthcoming fifth-generation wireless networks, due to its many advantages such as low cost …
Improving physical layer secrecy using full-duplex jamming receivers
This paper studies secrecy rate optimization in a wireless network with a single-antenna
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …
Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization
Consider an MISO channel overheard by multiple eavesdroppers. Our goal is to design an
artificial noise (AN)-aided transmit strategy, such that the achievable secrecy rate is …
artificial noise (AN)-aided transmit strategy, such that the achievable secrecy rate is …
Relay selection for security enhancement in cognitive relay networks
This letter proposes several relay selection policies for secure communication in cognitive
decode-and-forward relay networks, where a pair of cognitive relays is opportunistically …
decode-and-forward relay networks, where a pair of cognitive relays is opportunistically …
Overview of 5G security technology
X Ji, K Huang, L **, H Tang, C Liu, Z Zhong… - Science China …, 2018 - Springer
The 5th-generation mobile communication system (5G) has higher security requirements
than previous systems. Accordingly, international standard organizations, operators, and …
than previous systems. Accordingly, international standard organizations, operators, and …
Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer
In this paper, we study different secrecy rate optimization techniques for a multiple-input–
multiple-output (MIMO) secrecy channel, where a multiantenna cooperative jammer is …
multiple-output (MIMO) secrecy channel, where a multiantenna cooperative jammer is …
Joint information-and jamming-beamforming for physical layer security with full duplex base station
F Zhu, F Gao, M Yao, H Zou - IEEE Transactions on Signal …, 2014 - ieeexplore.ieee.org
In this paper, we design joint information beamforming and jamming beamforming to
guarantee both transmit security and receive security for a full-duplex base-station (FD-BS) …
guarantee both transmit security and receive security for a full-duplex base-station (FD-BS) …