We propose a robust resource allocation framework to improve the physical layer security in the presence of an active eavesdropper. In the considered system, we assume that both …
L Hu, H Wen, B Wu, J Tang, F Pan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper investigates cooperative security in wireless networks, where a source (Alice) intends to transmit a confidential message to a legitimate destination (Bob), with the help of …
In this paper, we study the benefits of full-duplex (FD) receiver jamming in enhancing the physical-layer security of a two-tier decentralized wireless network with each tier deployed …
In this paper, we study different secrecy rate optimization techniques for a multiple-input– multiple-output (MIMO) secrecy channel, where a multiantenna cooperative jammer is …
H Deng, HM Wang, W Guo… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we consider the problem of secure communications for a four-node system consisting of one source, one destination, one eavesdropper, and one helper. We …
We analyze and optimize the secrecy performance of artificial noise (AN) in multi-input single-output wiretap channels with multiple antennas at the transmitter and a single …
Z Chu, H Xing, M Johnston… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper investigates secrecy rate optimization problems for a multiple-input-single-output (MISO) secrecy channel in the presence of multiple multiantenna eavesdroppers …
This paper studies the secrecy rate maximization problem of a secure wireless communication system in the presence of multiple eavesdroppers. The security of the …
This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid full-duplex (FD)/half …