A full-duplex Bob in the MIMO Gaussian wiretap channel: Scheme and performance

L Li, Z Chen, D Zhang, J Fang - IEEE Signal Processing Letters, 2015 - ieeexplore.ieee.org
This letter considers secrecy communication from an information-theoretic perspective, and
studies the secrecy capacity of a multi-input multi-output (MIMO) Gaussian wiretap channel …

Power allocation and achievable secrecy rates in MISOME wiretap channels

T Van Nguyen, H Shin - IEEE communications letters, 2011 - ieeexplore.ieee.org
We consider transmission of confidential data over multiple-input single-output multiple-
eavesdropper (MISOME) Rayleigh-fading wiretap channels. The transmitter has access to …

Robust beamforming and jamming for enhancing the physical layer security of full duplex radios

Z Kong, S Yang, D Wang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we investigate the physical layer security of a full-duplex base station (BS)-
aided system in the worst case, where an uplink transmitter (UT) and a downlink receiver …

MIMO secret communications against an active eavesdropper

L Li, AP Petropulu, Z Chen - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
This paper considers a scenario in which an Alice-Bob pair wishes to communicate in secret
in the presence of an active Eve, who is capable of jamming as well as eavesdropping and …

On the secrecy degrees of freedom of the multiantenna block fading wiretap channels

M Kobayashi, P Piantanida, S Yang… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
We consider a practical scenario of the Gaussian multiantenna wiretap channel where a
transmitter with no channel state information wishes to send a confidential message to its …

Full-duplex bidirectional secure communications under perfect and distributionally ambiguous eavesdropper's CSI

Q Li, Y Zhang, J Lin, SX Wu - IEEE Transactions on Signal …, 2017 - ieeexplore.ieee.org
Consider a full-duplex (FD) bidirectional secure communication system, where two
communication nodes, named Alice and Bob, simultaneously transmit and receive …

Application of full-duplex wireless technique into secure MIMO communication: Achievable secrecy rate based optimization

Y Zhou, ZZ Xiang, Y Zhu, Z Xue - IEEE Signal Processing …, 2014 - ieeexplore.ieee.org
This letter considers the secure MIMO transmission in a wireless environment, in which one
transmitter (Alice), one receiver (Bob) and one eavesdropper (Eve) are involved. Apart from …

Secrecy energy efficiency of MIMOME wiretap channels with full-duplex jamming

O Taghizadeh, P Neuhaus, R Mathar… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Full-duplex (FD) jamming transceivers recently have been shown to enhance the
information security of wireless communication systems by simultaneously transmitting …

Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: Active adversary

MR Abedi, N Mokari, H Saeedi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We propose a robust resource allocation framework to improve the physical layer security in
the presence of an active eavesdropper. In the considered system, we assume that both …

A minorization–maximization algorithm for maximizing the secrecy rate of the MIMOME wiretap channel

M Masood, A Ghrayeb, P Babu, I Khalil… - IEEE …, 2016 - ieeexplore.ieee.org
We consider physical layer security in a multi-input multi-output multi-eavesdropper wiretap
channel and present an exact solution to the problem of secrecy rate maximization. A system …