Physical layer security in millimeter wave cellular networks

C Wang, HM Wang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
… -wide physical layer security performance of the downlink transmission in an mmWave
cellular network under a stochastic geometry framework. We first study the secure connectivity …

Physical layer security for multiple-antenna systems: A unified approach

KP Peppas, NC Sagias, A Maras - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
… on studying the fundamental ability of the physical layer to augment secrecy in wireless …
modeled by the κμ distribution whereas in the eavesdropper channel by the η − μ distribution […

On Physical Layer Security of - - - Fading Channels

A Mathur, Y Ai, MR Bhatnagar… - IEEE …, 2018 - ieeexplore.ieee.org
… -κ-μ model best fits the experimental data. Further, the non-unimodal nature of the α-η-κ-μ
envelope … over the α-η-κ-μ fading channels. The main contributions of this letter are as follows: …

Full-duplex small-cell networks: A physical-layer security perspective

A Babaei, AH Aghvami, A Shojaeifard… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
layer security performance in full-duplex (FD) small-cell net… We investigate the smallcell
network PHY-layer security … significantly improve the PHY-layer security performance, especially …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
… the wiretapper has access to an arbitrary subset μ of the N coded bits, and optimal tradeoffs
between code rate k/N and μ that guaranteed secrecy were characterized. The consideration …

[图书][B] Physical layer security in wireless communications

X Zhou, L Song, Y Zhang - 2013 - books.google.com
… say here that physical layer security is usually possible as soon as there is an asymmetry
in communication between Bob and Eve; in particular, physical layer security may be possible …

Physical layer security in cognitive millimeter wave networks

Y Song, W Yang, X Yang, Z Xiang, B Wang - IEEE Access, 2019 - ieeexplore.ieee.org
κ, Fκ (x) is the cumulative distribution function (CDF) of κ. Let κ = |hSP|2L (rSP), we first derive
the CDF of κ… Then, we solve the first derivative of CDF and derive the PDF of κ as shown in (…

Physical-layer security of SIMO communication systems over multipath fading conditions

JM Moualeu, PC Sofotasios… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
… This also concerns the effects of non-homogeneous fading environments such as α-µ [7],
and κ-µ and η-µ [8], which although they are encountered in realistic communication scenarios, …

Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
… In the generic model of physical layer security problem, we usually have three main
communication entities (nodes) as depicted in Fig. 1. The first node is basically the legitimate …

Physical-layer security on maximal ratio combining for SIMO cognitive radio networks over cascaded κ-μ fading channels

DH Tashman, W Hamouda - IEEE Transactions on Cognitive …, 2021 - ieeexplore.ieee.org
physical-layer security (PLS) of a single-input-multiple-output (SIMO) underlay cognitive
radio network (CRN) over cascaded κ-µ … user receiver over cascaded κ-µ channels. Moreover, …