Physical layer security schemes for MIMO systems: an overview

R Melki, HN Noura, MM Mansour, A Chehab - Wireless networks, 2020 - Springer
… Finally, we suggest applying physical layer security at two levels: the sub-… schemes such
as data encryption and integrity, device/message authentication, and/or availability schemes, …

Performance of transmit antenna selection physical layer security schemes

H Alves, RD Souza, M Debbah… - IEEE Signal Processing …, 2012 - ieeexplore.ieee.org
… Abstract—We analyze the physical layer (PHY) security of a communication scheme
probability, and we show that the PHY security can be considerably enhanced when multiple …

Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
… [94] considered the problem of resource allocation scheme for physical layer security in
cooperative OFDM networks using amplify-andforward (AF) strategy. To maximize the secrecy …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
… knowledge, and the achieved security can be quantified precisely. … schemes in addition
to the exploitation of any available channel state information, physical layer security schemes

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C Xiao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
… This is important to evaluate the usefulness of the physical layer based security schemes
and evaluate their performance in a practical transmission environment. Both WiFi …

Physical layer security in wireless networks: A tutorial

YS Shiu, SY Chang, HC Wu… - IEEE wireless …, 2011 - ieeexplore.ieee.org
schemes that could be used to achieve physical layerphysical layer security for wireless
networks have been discussed in a tutorial manner. Numerous existing physical layer security

Improving physical-layer security in wireless communications using diversity techniques

Y Zou, J Zhu, X Wang, VCM Leung - IEEE Network, 2015 - ieeexplore.ieee.org
… to show the physicallayer security improvement by exploiting … direct transmission as a
benchmark scheme, where the source … selection scheme for physical-layer security improvement. …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
… to implement any extra security schemes or algorithms on other layers above the physical
layer. This survey introduces the fundamental theories of PHY-security, covering confidentiality …

On cooperative relaying schemes for wireless physical layer security

J Li, AP Petropulu, S Weber - IEEE transactions on signal …, 2011 - ieeexplore.ieee.org
… Although security is typically addressed via cryptographic … security at the physical layer,
following the pioneering work of [9]. Recently, wireless physical (PHY) layer based security from …

A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
… Before designing a secure transmission scheme with limited power and energy, we first
analyse the factors of power consumption in wireless networks [163]. According to [164], the total …