Improving physical layer secrecy using full-duplex jamming receivers

G Zheng, I Krikidis, J Li, AP Petropulu… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper studies secrecy rate optimization in a wireless network with a single-antenna
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …

Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: Active adversary

MR Abedi, N Mokari, H Saeedi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We propose a robust resource allocation framework to improve the physical layer security in
the presence of an active eavesdropper. In the considered system, we assume that both …

Cooperative-jamming-aided secrecy enhancement in wireless networks with passive eavesdroppers

L Hu, H Wen, B Wu, J Tang, F Pan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper investigates cooperative security in wireless networks, where a source (Alice)
intends to transmit a confidential message to a legitimate destination (Bob), with the help of …

Safeguarding decentralized wireless networks using full-duplex jamming receivers

TX Zheng, HM Wang, Q Yang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we study the benefits of full-duplex (FD) receiver jamming in enhancing the
physical-layer security of a two-tier decentralized wireless network with each tier deployed …

Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer

Z Chu, K Cumanan, Z Ding, M Johnston… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we study different secrecy rate optimization techniques for a multiple-input–
multiple-output (MIMO) secrecy channel, where a multiantenna cooperative jammer is …

Secrecy transmission with a helper: To relay or to jam

H Deng, HM Wang, W Guo… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we consider the problem of secure communications for a four-node system
consisting of one source, one destination, one eavesdropper, and one helper. We …

Artificial noise: Transmission optimization in multi-input single-output wiretap channels

N Yang, S Yan, J Yuan, R Malaney… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We analyze and optimize the secrecy performance of artificial noise (AN) in multi-input
single-output wiretap channels with multiple antennas at the transmitter and a single …

Secrecy rate optimizations for a MISO secrecy channel with multiple multiantenna eavesdroppers

Z Chu, H Xing, M Johnston… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper investigates secrecy rate optimization problems for a multiple-input-single-output
(MISO) secrecy channel in the presence of multiple multiantenna eavesdroppers …

Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis

K Cumanan, GC Alexandropoulos… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
This paper studies the secrecy rate maximization problem of a secure wireless
communication system in the presence of multiple eavesdroppers. The security of the …

Physical layer security in wireless ad hoc networks under a hybrid full-/half-duplex receiver deployment strategy

TX Zheng, HM Wang, J Yuan, Z Han… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper studies physical layer security in a wireless ad hoc network with numerous
legitimate transmitter-receiver pairs and eavesdroppers. A hybrid full-duplex (FD)/half …