A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey of Optimization Approaches for Wireless Physical Layer Security
[article]
2019
arXiv
pre-print
The survey begins with typical wiretap channel models to cover common scenarios and systems. ...
The topics on physical-layer security designs are then summarized from resource allocation, beamforming/precoding, and antenna/node selection and cooperation. ...
Enhancing physical layer security in multi-antenna systems by beamforming/precoding with or without artificial noise. ...
arXiv:1901.07955v1
fatcat:3pb27rlc45c3dmnjgwmjyspvb4
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
, and relay networks. ...
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret ...
The cooperative jamming method of [111] was used in [202] as a precursor to secret key establishment over a two-way wiretap channel, and artificial noise was used to enhance secret key rates in a two-way ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
, and relay networks. ...
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret ...
The cooperative jamming method of [111] was used in [202] as a precursor to secret key establishment over a two-way wiretap channel, and artificial noise was used to enhance secret key rates in a two-way ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
A Survey on Cooperative Jamming Applied to Physical Layer Security
2015
2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)
Security has always played a critical role in wireless cooperative communication systems design. Eavesdropping and jamming are two common threats to the information security in wireless networks. ...
However, jamming can be used in a cooperative manner to enable a secure communication link between the legitimate transmitter and the intended receiver. ...
channel state information (CSI) at the destination to minimize the outage probability. ...
doi:10.1109/icuwb.2015.7324413
dblp:conf/icuwb/AtallahKK15
fatcat:x6vyqvd4zjfxzfyzzyvbmscb4q
An Overview of Key Technologies in Physical Layer Security
2020
Entropy
We start by introducing the basic theories of PLS, including the wiretap channel, information-theoretic security, and a brief discussion of the cryptography security technique. ...
This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information. ...
Abbreviations The following abbreviations are used in this manuscript: ...
doi:10.3390/e22111261
pmid:33287029
fatcat:ngkceebvprbbbkrwamjzqtwaci
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey
[article]
2013
arXiv
pre-print
This paper provides a survey of recent research and development in physical layer security considering the imperfect channel state information (CSI) at communication nodes. ...
nodes or in cognitive radio systems. ...
for multi-antenna channels, and other signaling designs for relay channels or cognitive radio systems. ...
arXiv:1307.4146v2
fatcat:nvho2lziqjep5my2zlibtk6hpm
Secure Transmission in Cooperative Relaying Networks With Multiple Antennas
2016
IEEE Transactions on Wireless Communications
In [8] and [9] , the impact of antenna correlation on the secrecy performance of multi-antenna wiretap channels was quantified. ...
In addition, as a benchmark, cooperative jamming with ZF scheme (CJ/ZF) is also analyzed, where the role of relay node is to send jamming signals to degrade the quality of the eavesdropper's channel. ...
M provides both diversity order and coding gain. ...
doi:10.1109/twc.2016.2591940
fatcat:5th5leqf3fcxhbbkhlva2cmjja
Secure Non-Orthogonal Multiple Access: An Interference Engineering Perspective
[article]
2020
arXiv
pre-print
In this article, we unleash the potential of network interference and exploit it constructively to enhance physical-layer security in NOMA networks. ...
However, over a wireless channel, the superimposed NOMA signals are highly susceptible to eavesdropping, potentially leading to severe leakage of confidential information. ...
In this way, secrecy against the untrusted relay is promised by cooperative jamming without coordination, thereby ensuring low complexity. ...
arXiv:2003.13488v2
fatcat:zi66mus2dbhq3djgmzczb3tenm
An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty
2016
IEEE Access
In this vein, it has been shown that fading channels can enhance the transmission of confidential information and that a secure communication can be achieved even when the channel to the eavesdropper is ...
INDEX TERMS Physical layer security, fading channels, channel state information, estimation error, rate-limited feedback, outdated CSI. ...
The authors, in [14] , present an earlier survey on physical layer security under the imperfect channel state information (CSI) assumption, with a particular focus on relay channels, cognitive system, ...
doi:10.1109/access.2016.2612585
fatcat:lhpjsjnkl5gg7oqjticfmww3x4
Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
2016
Sensors
Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper's channel, it explores a zero-forcing beamforming (ZFB) ...
eavesdropper and one multiple-antenna cooperative jammer. ...
wiretap channel [14] and in the MISO multi-antenna eavesdropper wiretap channel [15] , respectively. ...
doi:10.3390/s16111908
pmid:27845753
pmcid:PMC5134567
fatcat:fv5tfnq2ifdgjh5226bhcwlusi
A Two-Hop Multi-Relay Secure Transmission with Improved Suboptimal Relay Selection Scheme
2016
Journal of Communications
Index Terms-Artificial noise, best and worst relay, channel state information, secrecy throughput, intercept probability ...
Abstract-This work studies the use of relay selection in reducing the capability of a hidden eavesdropper to intercept the confidential message transmitted between information source and legitimate receiver ...
The use of joint cooperative techniques to ensure information secrecy in cognitive system was discussed in [10] while the authors in [11] , [12] discussed the cooperative relaying and power allocation ...
doi:10.12720/jcm.11.6.592-597
fatcat:qkeqbvzvsvcppkwr7yljrakbya
Safeguarding Next Generation Multiple Access Using Physical Layer Security Techniques: A Tutorial
[article]
2024
arXiv
pre-print
The purpose of this tutorial is to provide a comprehensive overview on the state-of-the-art physical layer security techniques that guarantee wireless security and privacy for NOMA networks, along with ...
This inspires the embrace of non-orthogonal multiple access (NOMA) in future wireless communication networks. ...
ACKNOWLEDGEMENT The authors would like to thank the current and past members of the research groups at Xidian University and Xi'an Jiaotong University, for their contributions to the work reported in this ...
arXiv:2403.16477v1
fatcat:jc3hu4bxgbfudibqp2nn334jdi
Interplay Between NOMA and Other Emerging Technologies: A Survey
2019
IEEE Transactions on Cognitive Communications and Networking
Non-orthogonal multiple access (NOMA) has been widely recognized as a promising way to scale up the number of users, enhance the spectral efficiency, and improve the userfairness in wireless networks, ...
NOMA can be flexibly combined with many existing wireless technologies and emerging ones including multiple-input multiple-output (MIMO), massive MIMO, millimeter wave communications, cognitive and cooperative ...
In [47] , for a K-user massive MIMO multi-way relaying, a novel NOMA transmission strategy, which can reduce the number of channel-uses to just two from (K − 1)/2 + 1 in the current state-of-the-art ...
doi:10.1109/tccn.2019.2933835
fatcat:5utwrrgtujbsrf7q5yngpcodie
Interplay Between NOMA and Other Emerging Technologies: A Survey
[article]
2019
arXiv
pre-print
Non-orthogonal multiple access (NOMA) has been widely recognized as a promising way to scale up the number of users, enhance the spectral efficiency, and improve the user fairness in wireless networks, ...
NOMA can be flexibly combined with many existing wireless technologies and emerging ones including multiple-input multiple-output (MIMO), massive MIMO, millimeter wave communications, cognitive and cooperative ...
In [47] , for a K-user massive MIMO multi-way relaying, a novel NOMA transmission strategy, which can reduce the number of channel-uses to just two from (K − 1)/2 + 1 in the current state-of-the-art ...
arXiv:1903.10489v2
fatcat:4u6soepjfjeiply4v2e2luionm
A Survey on MIMO Transmission with Discrete Input Signals: Technical Challenges, Advances, and Future Trends
[article]
2017
arXiv
pre-print
, and MIMO wiretap channel. ...
Multiple antennas have been exploited for spatial multiplexing and diversity transmission in a wide range of communication applications. ...
For MIMOME wiretap channel without the eavesdropper's CSI, J.-C. ...
arXiv:1704.07611v1
fatcat:4gep4gnbefdytjdggniocdora4
« Previous
Showing results 1 — 15 out of 60 results