Optimal and suboptimal full-duplex secure beamforming designs for MISO two-way communications

Y Wan, Q Li, Q Zhang, J Qin - IEEE Wireless Communications …, 2015 - ieeexplore.ieee.org
In this letter, we investigate full-duplex (FD) secure beamforming design problem for multiple-
input-single-output two-way communication systems. Our objective is to maximize sum …

Secure beamforming for full-duplex MIMO two-way untrusted relay systems

S Zhao, J Liu, Y Shen, X Jiang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper focuses on a full-duplex multiple-input multiple-output two-way untrusted relay
system, and investigates the optimal beamforming design of such system to maximize its …

Advanced properties of full-duplex radio for securing wireless network

Y Hua - IEEE Transactions on Signal Processing, 2018 - ieeexplore.ieee.org
This paper examines the role of full-duplex radio for securing wireless network from a new
perspective. It first studies the secrecy capacity of two single-antenna full-duplex users …

Secrecy rate optimization in wireless multi-hop full duplex networks

F Tian, X Chen, S Liu, X Yuan, D Li, X Zhang… - IEEE …, 2018 - ieeexplore.ieee.org
Physical layer security and full duplex have been two widely applied techniques in wireless
communications community, where the physical layer security can prevent eavesdropping …

STAR-RIS-assisted-full-duplex jamming design for secure wireless communications system

Y Wen, G Chen, S Fang, Z Chu, P Xiao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Physical layer security (PLS) technologies are expected to play an important role in the next-
generation wireless networks, by providing secure communication to protect critical and …

Sum secrecy rate maximization for full-duplex two-way relay networks using Alamouti-based rank-two beamforming

Q Li, WK Ma, D Han - IEEE Journal of Selected Topics in Signal …, 2016 - ieeexplore.ieee.org
Consider a two-way communication scenario where two single-antenna nodes, operating
under full-duplex mode, exchange information to one another through the aid of a (full …

Secrecy of multi-antenna transmission with full-duplex user in the presence of randomly located eavesdroppers

I Zabir, A Maksud, G Chen, BM Sadler… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
This paper considers the secrecy performance of several schemes for multi-antenna
transmission to single-antenna users with full-duplex (FD) capability against randomly …

Deep reinforcement learning for RIS-aided multiuser full-duplex secure communications with hardware impairments

Z Peng, Z Zhang, L Kong, C Pan, L Li… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
In this article, we investigate a reconfigurable intelligent surface (RIS)-aided multiuser full-
duplex secure communication system with hardware impairments at transceivers and RIS …

Safeguarding decentralized wireless networks using full-duplex jamming receivers

TX Zheng, HM Wang, Q Yang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we study the benefits of full-duplex (FD) receiver jamming in enhancing the
physical-layer security of a two-tier decentralized wireless network with each tier deployed …

Proactive eavesdropping via jamming in full-duplex multi-antenna systems: Beamforming design and antenna selection

F Feizi, M Mohammadi, Z Mobini… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper investigates the application of full-duplex (FD) multi-antenna transceivers in
proactive eavesdropping systems. To this end, we jointly optimize the transmit and receive …