[PDF][PDF] Secrecy sum-rates for the multiple-access wire-tap channel with ergodic block fading

E Tekin, A Yener - 45th Annual Allerton Conference on Communication …, 2007 - Citeseer
We consider a two-user multiple-access wiretap channel that undergoes ergodic block
fading. In this scenario, there are two users are communicating with a base station in the …

Transmit antenna selection in MIMO wiretap channels: A machine learning approach

D He, C Liu, TQS Quek, H Wang - IEEE Wireless …, 2018 - ieeexplore.ieee.org
In this letter, we exploit the potential benefits of machine learning in enhancing physical
layer security in multi-input multi-output multi-antenna-eavesdropper wiretap channels. To …

Optimal semiadaptive transmission with artificial-noise-aided beamforming in MISO wiretap channels

Z Li, P Mu, B Wang, X Hu - IEEE Transactions on Vehicular …, 2015 - ieeexplore.ieee.org
This paper studies the design of artificial-noise-aided (AN-aided) secure transmission in
slow-fading multiple-input–single-output (MISO) channels. We consider the scenario where …

Secrecy outage capacity of fading channels

O Gungor, J Tan, CE Koksal… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
This paper considers point-to-point secure communication over flat fading channels under
an outage constraint. More specifically, we extend the definition of outage capacity to …

Simultaneous secure and covert transmissions against two attacks under practical assumptions

M Forouzesh, FS Khodadad, P Azmi… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In practice, Internet of Things (IoT) applications may face two different hostile attacks, ie,
overhearing the broadcasted data and detecting the presence of data communication …

Secure multicast energy-efficiency maximization with massive RISs and uncertain CSI: First-order algorithms and convergence analysis

Z Li, S Wang, M Wen, YC Wu - IEEE Transactions on Wireless …, 2022 - ieeexplore.ieee.org
Reconfigurable intelligent surface (RIS) has the potential to significantly enhance the
network secure transmission performance by reconfiguring the wireless propagation …

A practical implementation of physical layer security in wireless networks

SA Hoseini, F Bouhafs… - 2022 IEEE 19th Annual …, 2022 - ieeexplore.ieee.org
Physical Layer Security (PLS) is widely recognized as a promising approach to secure
wireless communications through the exploitation of the physical properties of the wireless …

Cooperative-jamming-aided secrecy enhancement in wireless networks with passive eavesdroppers

L Hu, H Wen, B Wu, J Tang, F Pan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper investigates cooperative security in wireless networks, where a source (Alice)
intends to transmit a confidential message to a legitimate destination (Bob), with the help of …

Physical layer security with threshold-based multiuser scheduling in multi-antenna wireless networks

M Yang, D Guo, Y Huang, TQ Duong… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we consider a multiuser downlink wiretap network consisting of one base
station (BS) equipped with AA antennas, NB single-antenna legitimate users, and NE single …

Achievable secrecy rate regions for the two-way wiretap channel

A El Gamal, OO Koyluoglu, M Youssef… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
The two-way wiretap channel is considered in this paper. Two legitimate users, Alice and
Bob, wish to exchange messages securely in the presence of a passive eavesdropper Eve …