Principles of physical layer security in multiuser wireless networks: A survey
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …
multiuser wireless networks. The essential premise of physical layer security is to enable the …
An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
Secure radar-communication systems with malicious targets: Integrating radar, communications and jamming functionalities
This article studies the physical layer security in a multiple-input-multiple-output (MIMO) dual-
functional radar-communication (DFRC) system, which communicates with downlink cellular …
functional radar-communication (DFRC) system, which communicates with downlink cellular …
Improving physical layer secrecy using full-duplex jamming receivers
This paper studies secrecy rate optimization in a wireless network with a single-antenna
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …
Secure transmission in multicell massive MIMO systems
In this paper, we consider physical layer security provisioning in multicell massive multiple-
input-multiple-output (MIMO) systems. Specifically, we consider secure downlink …
input-multiple-output (MIMO) systems. Specifically, we consider secure downlink …
Distributed beamforming for physical-layer security of two-way relay networks
In this paper, we address the security of a two-way relay network in the presence of an
eavesdropper, where each node is only equipped with single antenna. We propose two …
eavesdropper, where each node is only equipped with single antenna. We propose two …
Cooperation with an untrusted relay: A secrecy perspective
X He, A Yener - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
We consider the communication scenario where a source-destination pair wishes to keep
the information secret from a relay node despite wanting to enlist its help. For this scenario …
the information secret from a relay node despite wanting to enlist its help. For this scenario …
Wireless physical-layer security: Lessons learned from information theory
Physical-layer security utilizes resources of the transmission medium to guarantee secure
communication against an adversary with unlimited computational power. Rooted in …
communication against an adversary with unlimited computational power. Rooted in …
Secrecy transmit beamforming for heterogeneous networks
In this paper, we pioneer the study of physical-layer security in heterogeneous networks
(HetNets). We investigate secure communications in a two-tier downlink HetNet, which …
(HetNets). We investigate secure communications in a two-tier downlink HetNet, which …
Secrecy sum-rates for multi-user MIMO regularized channel inversion precoding
In this paper, we propose a linear precoder for the downlink of a multi-user MIMO system
with multiple users that potentially act as eavesdroppers. The proposed precoder is based …
with multiple users that potentially act as eavesdroppers. The proposed precoder is based …