Physical layer security aided wireless interference networks in the presence of strong eavesdropper channels

Z Sheng, HD Tuan, AA Nasir, HV Poor… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Under both long (infinite) and short (finite) blocklength transmissions, this paper considers
physical layer security for a wireless interference network of multiple transmitter-user pairs …

PLS for wireless interference networks in the short blocklength regime with strong wiretap channels

Z Sheng, HD Tuan, AA Nasir… - GLOBECOM 2020-2020 …, 2020 - ieeexplore.ieee.org
This paper considers a wireless interference network in which the communication between
multiple transmitter-user pairs is overheard by multiple eavesdroppers (EVs). Based on …

Outage-aware secure beamforming in MISO wireless interference networks

Z Sheng, HD Tuan, TQ Duong… - IEEE Signal Processing …, 2018 - ieeexplore.ieee.org
Based on the knowledge of the channel distributions of a multi-input single-output wireless
network of multiple transmitter-user pairs overheard by an eavesdropper, this letter develops …

Interference alignment for physical layer security in multi-user networks with passive eavesdroppers

L Hu, S Tan, H Wen, J Wu, J Fan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We investigate the physical layer security (PLS) in multi-user interference networks. In
particular, we consider secure transmission from a legitimate source (Alice) to a legitimate …

Power allocation for energy efficiency and secrecy of interference wireless networks

Z Sheng, HD Tuan, AA Nasir, TQ Duong… - arXiv preprint arXiv …, 2017 - arxiv.org
Considering a multi-user interference network with an eavesdropper, this paper aims at the
power allocation to optimize the worst secrecy throughput among the network links or the …

Secure transmission for interference networks: User selection and transceiver design

N Zhao, Q Cao, G Gui, Y Cao, S Zhang… - IEEE Systems …, 2019 - ieeexplore.ieee.org
Interference is usually regarded as a detrimental factor that degrades the performance of a
wireless network. However, when it is used properly, the security of transmission can be …

Power allocation for energy efficiency and secrecy of wireless interference networks

Z Sheng, HD Tuan, AA Nasir… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Considering a multi-user interference network with an eavesdropper, this paper aims at the
power allocation to optimize the worst secrecy throughput among the network links or the …

Co-Ordinated Secure Beamforming in -User Interference Channel With Multiple Eavesdroppers

T Lv, H Gao, R Cao, J Zhou - IEEE Wireless Communications …, 2016 - ieeexplore.ieee.org
In this letter, we consider secrecy communications over multiple-input single-output K-user
interference channel in the presence of multiple eavesdroppers. Each legitimate data link is …

Artificial noise assisted interference alignment for physical layer security enhancement

L Hu, J Peng, Y Zhang, H Wen, S Tan… - … 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
Secure transfer of wireless information is becoming a critical issue in multi-user interference
networks. In this paper, we consider secure transmission from a source (Alice) to a legitimate …

Beamforming aided interference management with improved secrecy for correlated channels

G Dartmann, O Cepheli, GK Kurt… - 2014 IEEE 79th …, 2014 - ieeexplore.ieee.org
This paper targets the joint optimization of the signal-to-interference-plus-noise ratio (SINR)
and secrecy in wireless networks. Although the optimization of the SINR with beamforming …