A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
… transmission scheme with limited power and energy, we first analyse the factors of power
consumption in wireless networks [163]. According to [164], the total power consumption along …

Physical-layer authentication for wireless security enhancement: Current challenges and future developments

X Wang, P Hao, L Hanzo - IEEE Communications Magazine, 2016 - ieeexplore.ieee.org
physical-layer authentication techniques into existing wireless networks, we propose a
cross-layer … on a composite security key that can seamlessly integrate physical-layer and upper-…

Physical-layer security in distributed wireless networks using matching theory

S Bayat, RHY Louie, Z Han… - … Forensics and Security, 2013 - ieeexplore.ieee.org
… Abstract—We consider the use of physical-layer security in a wireless communication system
… SYSTEM MODEL We consider a wireless network comprising of source node – destination …

Physical layer security jamming: Theoretical limits and practical designs in wireless networks

K Cumanan, H Xing, P Xu, G Zheng, X Dai… - IEEE …, 2016 - ieeexplore.ieee.org
… This article focuses on physical layer security jamming techniques based on user
cooperations and external nodes. Firstly, theoretical limits of jamming through user cooperation is …

Physical layer security in wireless networks with passive and active eavesdroppers

A Chorti, SM Perlaza, Z Han… - 2012 IEEE Global …, 2012 - ieeexplore.ieee.org
Security is becoming an increasingly important issue in wireless communications, to which
physical layer … In this paper, the resilience of multi-user networks to passive and active …

Adaptive secure transmission for physical layer security in cooperative wireless networks

L Hu, H Wen, B Wu, J Tang… - IEEE Communications …, 2016 - ieeexplore.ieee.org
… In this letter, we study secure transmission in cooperative wireless networks, where a source
(Alice) intends to send a confidential message to a destination (Bob), in the presence of an …

Physical layer key generation in wireless networks: challenges and opportunities

K Zeng - IEEE Communications Magazine, 2015 - ieeexplore.ieee.org
security strength of physical layer key generation under different attacking models. In order to
achieve secure physical layerphysical system security and privacy, physical layer security, …

An overview of physical layer security in wireless communication systems with CSIT uncertainty

A Hyadi, Z Rezki, MS Alouini - IEEE Access, 2016 - ieeexplore.ieee.org
… In this article, we present a comprehensive review of recent and ongoing research works
on physical layer security with CSIT uncertainty. We focus on both information theoretic and …

Physical layer security in wireless cooperative relay networks: State of the art and beyond

LJ Rodriguez, NH Tran, TQ Duong… - IEEE …, 2015 - ieeexplore.ieee.org
… There is no doubt that benefits offered by cooperative relaying to enhance the security at
the physical layer of wireless networks are significant. However, while quite a few …

Physical layer security in heterogeneous cellular networks

HM Wang, TX Zheng, J Yuan… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… Abstract—The heterogeneous cellular network (HCN) is a promising approach to the
deployment of 5G cellular networks. This paper comprehensively studies physical layer security in …