Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Secure radar-communication systems with malicious targets: Integrating radar, communications and jamming functionalities

N Su, F Liu, C Masouros - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
This article studies the physical layer security in a multiple-input-multiple-output (MIMO) dual-
functional radar-communication (DFRC) system, which communicates with downlink cellular …

Improving physical layer secrecy using full-duplex jamming receivers

G Zheng, I Krikidis, J Li, AP Petropulu… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper studies secrecy rate optimization in a wireless network with a single-antenna
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …

Secure transmission in multicell massive MIMO systems

J Zhu, R Schober, VK Bhargava - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we consider physical layer security provisioning in multicell massive multiple-
input-multiple-output (MIMO) systems. Specifically, we consider secure downlink …

Distributed beamforming for physical-layer security of two-way relay networks

HM Wang, Q Yin, XG Xia - IEEE Transactions on Signal …, 2012 - ieeexplore.ieee.org
In this paper, we address the security of a two-way relay network in the presence of an
eavesdropper, where each node is only equipped with single antenna. We propose two …

Cooperation with an untrusted relay: A secrecy perspective

X He, A Yener - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
We consider the communication scenario where a source-destination pair wishes to keep
the information secret from a relay node despite wanting to enlist its help. For this scenario …

Wireless physical-layer security: Lessons learned from information theory

A Yener, S Ulukus - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
Physical-layer security utilizes resources of the transmission medium to guarantee secure
communication against an adversary with unlimited computational power. Rooted in …

Secrecy transmit beamforming for heterogeneous networks

T Lv, H Gao, S Yang - IEEE Journal on Selected Areas in …, 2015 - ieeexplore.ieee.org
In this paper, we pioneer the study of physical-layer security in heterogeneous networks
(HetNets). We investigate secure communications in a two-tier downlink HetNet, which …

Secrecy sum-rates for multi-user MIMO regularized channel inversion precoding

G Geraci, M Egan, J Yuan, A Razi… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
In this paper, we propose a linear precoder for the downlink of a multi-user MIMO system
with multiple users that potentially act as eavesdroppers. The proposed precoder is based …