SH Chae, W Choi, JH Lee… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Recently, the use of artificial noise has attracted considerable attention in enhancing the physical-layer security of wireless systems. However, the interaction between artificially …
J Zhu, Y Chen, Y Shen, O Takahashi, X Jiang… - Ad hoc networks, 2014 - Elsevier
This paper considers the transmission of confidential messages over noisy wireless ad hoc networks, where both background noise and interference from concurrent transmitters affect …
This paper analyzes the Secrecy Transmission Capacity (STC) over wireless networks, where the legitimate nodes and eavesdroppers are distributed following Poisson point …
PC Pinto, J Barros, MZ Win - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
The ability to exchange secret information is critical to many commercial, governmental, and military networks. Information-theoretic security-widely accepted as the strictest notion of …
This paper studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper …
The main objective of this book is to investigate the wireless physical layer security in random cellular networks. Security is a fundamental issue in data communications. In …
Due to the nature of a wireless medium, a wireless channel is susceptible to malicious nodes, which encourages the consideration of secrecy in many applications such as satellite …
Physical layer secrecy in wireless networks in the presence of eavesdroppers of unknown location is considered. In contrast to prior schemes, which have expended energy in the …
Wireless physical layer security has attracted great attention in recent years. Although mobility is an intrinsic property of wireless networks, most of the existing works only consider …