Associating MIMO beamforming with security codes to achieve unconditional communication security

J Tang, H Wen, L Hu, H Song, G Zhang… - Iet …, 2016 - Wiley Online Library
This study investigates the framework of associating multiple‐input–multiple‐output (MIMO)
beamforming with secure code to achieve unconditional secure communications in the …

Artificial-noise-aided coordinated secure transmission design in multi-cell multi-antenna networks with limited feedback

Z Tang, L Sun, X Tian, D Niyato… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we consider secure communications in a multi-cell downlink multi-antenna
system, where each multi-antenna base station (BS) sends confidential messages to one …

Adaptive full-duplex jamming receiver for secure D2D links in random networks

HM Wang, BQ Zhao, TX Zheng - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Device-to-device (D2D) communication raises new transmission secrecy protection
challenges, since conventional physical layer security approaches, such as multiple …

Combating full-duplex active eavesdropper: A hierarchical game perspective

X Tang, P Ren, Y Wang, Z Han - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Security is an issue of paramount importance, yet is it a significant challenge for wireless
communications, which becomes more intricate when facing a full duplex (FD) active …

Maximizing secrecy capacity of underlay MIMO-CRN through bi-directional zero-forcing beamforming

N Nandan, S Majhi, HC Wu - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
This paper presents the optimal physical-layer security scheme of both primary user (PU)
and secondary user (SU) in the underlay multiple-input multiple-output cognitive-radio …

Power-efficient secure transmission against full-duplex active eavesdropper: A game-theoretic framework

X Tang, P Ren, Z Han - IEEE Access, 2017 - ieeexplore.ieee.org
Information security is of paramount importance yet significant challenge for wireless
communications. In this paper, we investigate the power-efficient transmissions with security …

Secure full-duplex small-cell networks in a spectrum sharing environment

NP Nguyen, C Kundu, HQ Ngo, TQ Duong… - IEEE …, 2016 - ieeexplore.ieee.org
In this paper, we propose three relay selection schemes for full-duplex heterogeneous
networks in the presence of multiple cognitive radio eavesdroppers. In this setup, the …

Joint optimization of AN-aided beamforming and power splitting designs for MISO secrecy channel with SWIPT

Z Zhu, Z Chu, Z Wang, I Lee - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
In this paper, we study an energy harvesting scheme for a multiple-input-single-output
secrecy channel under imperfect channel state information case with either deterministic …

Secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers under secrecy outage probability constraint

P Mu, X Hu, B Wang, Z Li - IEEE Communications Letters, 2015 - ieeexplore.ieee.org
The issue of physical layer security for single-input-multiple-output (SIMO) wiretap channel
with uncoordinated cooperative jamming (UCJ) is addressed in this letter, and we focus on …

Exploiting full-duplex receivers for achieving secret communications in multiuser MISO networks

B Akgun, OO Koyluoglu, M Krunz - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We consider a broadcast channel in which a multi-antenna transmitter (Alice) sends K
confidential information signals to K legitimate users (Bobs) in the presence of L …