J Moon, SH Lee, H Lee, I Lee - IEEE Transactions on Wireless …, 2019 - ieeexplore.ieee.org
In this paper, we study a legitimate proactive eavesdropping scenario where a central monitor covertly wiretaps the communications between a pair of suspicious users via …
Q Zhang, X Huang, Q Li, J Qin - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Considering simultaneous wireless information and power transfer (SWIPT), we investigate cooperative-jamming (CJ) aided robust secure transmission design in multiple-input-single …
C Jeong, IM Kim - IEEE Transactions on Signal Processing, 2011 - ieeexplore.ieee.org
We study power allocation for secrecy rate maximization in a multicarrier decode-and- forward relay system, where an eavesdropper exists. We consider three transmission …
M Tian, X Huang, Q Zhang, J Qin - IEEE Signal Processing …, 2014 - ieeexplore.ieee.org
In this letter, considering the simultaneous wireless information and power transfer scheme, we study the robust artificial noise (AN)-aided secure transmission design in multiple-input …
Information theoretic security has recently emerged as an effective physical layer approach to provide secure communications. The outage performance of such a secrecy …
Secure relay and jammer selection for physical-layer security is studied in a wireless network with multiple intermediate nodes and eavesdroppers, where each intermediate …
H Deng, HM Wang, W Guo… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we consider the problem of secure communications for a four-node system consisting of one source, one destination, one eavesdropper, and one helper. We …
Z Sheng, HD Tuan, TQ Duong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas, while the users and eavesdropper are …
Q Li, L Yang - IEEE Transactions on Information Forensics and …, 2018 - ieeexplore.ieee.org
Physical-layer secure is an important issue for untrusted relay systems. In this paper, we investigate secure precoding design for non-regenerative multiple-input multiple-output …