Physical-layer security for MISO visible light communication channels

A Mostafa, L Lampe - IEEE Journal on Selected Areas in …, 2015 - ieeexplore.ieee.org
… To formulate the problem properly, we recall relevant definitions from information theory [4],
[34]. A (2nR, n) code for a real-valued Gaussian MISO channel subject to an amplitude …

Physical-layer security in multiuser visible light communication networks

L Yin, H Haas - IEEE Journal on Selected Areas in …, 2017 - ieeexplore.ieee.org
… Moving from network information theory, recent works have evaluated the secrecy performance
in multiuser wireless networks using mathematical tools from stochastic geometry [14], […

Tradeoff between delay and physical layer security in wireless networks

Y Zhong, X Ge, T Han, Q Li… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
… From the point of view of the information theory, the security … where a source sends the
information to a legitimate receiver … the joint optimization of the physical layer security and the end-…

Physical layer security in large-scale random multiple access wireless sensor networks: a stochastic geometry approach

TX Zheng, X Chen, C Wang, KK Wong… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… in developing physical layer security during the past decade, from the viewpoints of both
information theory and signal processing. Early research on physical layer security have been …

Exploiting direct links for physical layer security in multiuser multirelay networks

L Fan, N Yang, TQ Duong, M Elkashlan… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
… This paper lays the groundwork for understanding the role of the direct link on the PHY
layer security in the uplink of multi-user multi-relay networks, which stands as a major …

Physical layer security with its applications in 5G networks: A review

L Sun, Q Du - China communications, 2017 - ieeexplore.ieee.org
Physical layer security techniques harness the intrinsic randomness at the physical layer
to create the “physical … In the next section, we will review the major physical-layer security

Wireless Physical Layer Security: An Information Theoretic Approach

OO Koyluoglu - 2010 - rave.ohiolink.edu
… on both the theoretical and the practical aspects of physical layer security. We first … information
theoretic security are based on random codes. Achieving information theoretical security

A novel chaos-based physical layer security transmission scheme for Internet of Things

J Liu, A Ren, R Sun, X Du… - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
Physical layer as the cornerstone of IoT, appears to be a promising direction for enhancing
the security of IoT. As a consequence, we propose a novel chaotic physical layer security

Distributed beamforming for physical-layer security of two-way relay networks

HM Wang, Q Yin, XG Xia - IEEE Transactions on Signal …, 2012 - ieeexplore.ieee.org
… In this paper, we investigate the physical layer security of bidirectional (two-way) information
transmission of two terminals with the help of multiple relay nodes in the presence of an …

Wireless physical-layer security: The challenges ahead

M Di Renzo, M Debbahua - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
… of physicallayer security takes advantage of these characteristics for improving the security
and … from common information,” IEEE Transactions on Information Theory, vol. 39, no. 3, pp. …