Pilot contamination for active eavesdropping
Existing studies on physical layer security often assume the availability of perfect channel
state information (CSI) and overlook the importance of channel training needed for obtaining …
state information (CSI) and overlook the importance of channel training needed for obtaining …
Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels
This letter proposes a paradigm shift in wireless security from preventing conventional
eavesdropping attacks to a new legitimate surveillance objective by studying how a …
eavesdropping attacks to a new legitimate surveillance objective by studying how a …
Cell-free massive MIMO networks: Optimal power control against active eavesdropping
This paper studies the security aspect of a recently introduced “cell-free massive MIMO”
network under a pilot spoofing attack. First, a simple method to recognize the presence of …
network under a pilot spoofing attack. First, a simple method to recognize the presence of …
Jamming games in the MIMO wiretap channel with an active eavesdropper
A Mukherjee, AL Swindlehurst - IEEE Transactions on Signal …, 2012 - ieeexplore.ieee.org
This paper investigates reliable and covert transmission strategies in a multiple-input
multiple-output (MIMO) wiretap channel with a transmitter, receiver and an adversarial …
multiple-output (MIMO) wiretap channel with a transmitter, receiver and an adversarial …
Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: Active adversary
We propose a robust resource allocation framework to improve the physical layer security in
the presence of an active eavesdropper. In the considered system, we assume that both …
the presence of an active eavesdropper. In the considered system, we assume that both …
Jamming-assisted eavesdropping over parallel fading channels
Unlike passive eavesdropping, proactive eavesdropping is recently proposed to use
jamming to moderate a suspicious link's communication rate for facilitating simultaneous …
jamming to moderate a suspicious link's communication rate for facilitating simultaneous …
Optimization-based access assignment scheme for physical-layer security in D2D communications underlaying a cellular network
L Wang, J Liu, M Chen, G Gui… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we consider physical-layer security for device-to-device (D2D)
communications underlaying cellular networks in which cellular users are under threat from …
communications underlaying cellular networks in which cellular users are under threat from …
MIMO secret communications against an active eavesdropper
L Li, AP Petropulu, Z Chen - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
This paper considers a scenario in which an Alice-Bob pair wishes to communicate in secret
in the presence of an active Eve, who is capable of jamming as well as eavesdropping and …
in the presence of an active Eve, who is capable of jamming as well as eavesdropping and …
Full-duplex cyber-weapon with massive arrays
In order to enhance secrecy performance of protecting scenarios, understanding the
illegitimate side is crucial. In this paper, from the perspective of the illegitimate side, the …
illegitimate side is crucial. In this paper, from the perspective of the illegitimate side, the …
Proactive attack: A strategy for legitimate eavesdropping
H Tran, HJ Zepernick - 2016 IEEE Sixth International …, 2016 - ieeexplore.ieee.org
In this paper, we study a novel approach to eavesdrop the messages of suspicious users for
a surveillance purpose. In particular, we consider a scenario in which the legitimate monitor …
a surveillance purpose. In particular, we consider a scenario in which the legitimate monitor …