A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

[图书][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel

E Ekrem, S Ulukus - IEEE Transactions on Information Theory, 2011 - ieeexplore.ieee.org
In this paper, we consider the Gaussian multiple-input multiple-output (MIMO) multi-receiver
wiretap channel in which a transmitter wants to have confidential communication with an …

Secrecy in cooperative relay broadcast channels

E Ekrem, S Ulukus - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
We investigate the effects of user cooperation on the secrecy of broadcast channels by
considering a cooperative relay broadcast channel. We show that user cooperation can …

Secure degrees of freedom of one-hop wireless networks

J Xie, S Ulukus - IEEE Transactions on Information Theory, 2014 - ieeexplore.ieee.org
We study the secure degrees of freedom (dof) of one-hop wireless networks by considering
four fundamental wireless network structures: 1) Gaussian wiretap channel; 2) Gaussian …

Secure Degrees of Freedom of -User Gaussian Interference Channels: A Unified View

J Xie, S Ulukus - IEEE Transactions on Information Theory, 2015 - ieeexplore.ieee.org
We determine the exact sum secure degrees of freedom (dof) of the K-user Gaussian
interference channel. We consider three different secrecy constraints: 1) K-user interference …

[PDF][PDF] Secrecy capacity of a class of broadcast channels with an eavesdropper

E Ekrem, S Ulukus - EURASIP Journal on Wireless Communications and …, 2009 - Springer
We study the security of communication between a single transmitter and many receivers in
the presence of an eavesdropper for several special classes of broadcast channels. As the …

A secure communication game with a relay helping the eavesdropper

M Yuksel, X Liu, E Erkip - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
In this work, a four-terminal complex Gaussian network composed of a source, a destination,
an eavesdropper, and a jammer relay is studied under two different set of assumptions: 1) …

[PDF][PDF] Secrecy capacity of a class of orthogonal relay eavesdropper channels

V Aggarwal, L Sankar, AR Calderbank… - EURASIP Journal on …, 2009 - Springer
The secrecy capacity of relay channels with orthogonal components is studied in the
presence of an additional passive eavesdropper node. The relay and destination receive …

Secure degrees of freedom region of the two-user MISO broadcast channel with alternating CSIT

P Mukherjee, R Tandon… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The two user multiple-input single-output (MISO) broadcast channel with confidential
messages (BCCM) is studied, in which the nature of channel state information at the …