Artificial noise assisted interference alignment for physical layer security enhancement

L Hu, J Peng, Y Zhang, H Wen, S Tan… - … 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
Secure transfer of wireless information is becoming a critical issue in multi-user interference
networks. In this paper, we consider secure transmission from a source (Alice) to a legitimate …

Interference alignment for physical layer security in multi-user networks with passive eavesdroppers

L Hu, S Tan, H Wen, J Wu, J Fan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We investigate the physical layer security (PLS) in multi-user interference networks. In
particular, we consider secure transmission from a legitimate source (Alice) to a legitimate …

Generalized interference alignment—Part II: Application to wireless secrecy

L Ruan, VKN Lau, MZ Win - IEEE Transactions on Signal …, 2015 - ieeexplore.ieee.org
In contrast to its wired counterpart, wireless communication is highly susceptible to
eavesdropping due to the broadcast nature of the wireless propagation medium. Recent …

Secure beamforming and artificial noise design in interference networks with imperfect ECSI

J Zhou, R Cao, H Gao, C Zhang… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
This paper investigates the joint robust beamforming and artificial noise design in two-user
interference networks, where one of the two pairs is wiretapped by an external …

Physical layer security aided wireless interference networks in the presence of strong eavesdropper channels

Z Sheng, HD Tuan, AA Nasir, HV Poor… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Under both long (infinite) and short (finite) blocklength transmissions, this paper considers
physical layer security for a wireless interference network of multiple transmitter-user pairs …

Unified interference engineering for wireless information secrecy

L Ruan, A Conti, MZ Win - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
Wireless communications are highly susceptible to eavesdropping due to their inherent
broadcast nature. Recent works have proposed the use of interference for impeding the …

Interference alignment for secrecy

OO Koyluoglu, H El Gamal, L Lai… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
This paper studies the frequency/time selective K-user Gaussian interference channel with
secrecy constraints. Two distinct models, namely the interference channel with confidential …

Generalized interference alignment—Part I: Theoretical framework

L Ruan, VKN Lau, MZ Win - IEEE Transactions on Signal …, 2015 - ieeexplore.ieee.org
Interference alignment (IA) has attracted enormous research interest as it achieves optimal
capacity scaling with respect to signal to noise ratio on interference networks. IA has also …

Secrecy-rate balancing for two-user MISO interference channels

J Ni, KK Wong, Z Fei, C Xing, H Chen… - IEEE Wireless …, 2013 - ieeexplore.ieee.org
This paper considers a two-user multiple-input single-output (MISO) interference channel
with confidential messages (IFC-CM), where the beamforming vectors at the two transmitters …

[PDF][PDF] Cooperative binning and channel prefixing for secrecy in interference channels

OO Koyluoglu, H El Gamal - IEEE Trans. Inf. Theory, 2009 - Citeseer
This paper investigates the fundamental performance limits of the two-user interference
channel in the presence of an external eavesdropper. In this setting, we construct an inner …