A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

Robust beamforming designs in secure MIMO SWIPT IoT networks with a nonlinear channel model

Z Zhu, N Wang, W Hao, Z Wang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In this article, we study a robust beamforming design for multiuser multiple-input–multiple-
output secrecy networks with simultaneous wireless information and power transfer (SWIPT) …

Outage constrained robust beamforming for secure broadcasting systems with energy harvesting

Z Zhu, Z Chu, Z Wang, I Lee - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
In this paper, we investigate simultaneous wireless information and power transfer systems
for multiuser multiple-input single-output secure broadcasting channels. Considering …

Beamforming and power splitting designs for AN-aided secure multi-user MIMO SWIPT systems

Z Zhu, Z Chu, N Wang, S Huang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, an energy harvesting scheme for a multi-user multiple-input-multiple-output
secrecy channel with artificial noise (AN) transmission is investigated. Joint optimization of …

Secrecy rate optimizations for a MISO secrecy channel with multiple multiantenna eavesdroppers

Z Chu, H Xing, M Johnston… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper investigates secrecy rate optimization problems for a multiple-input-single-output
(MISO) secrecy channel in the presence of multiple multiantenna eavesdroppers …

Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis

K Cumanan, GC Alexandropoulos… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
This paper studies the secrecy rate maximization problem of a secure wireless
communication system in the presence of multiple eavesdroppers. The security of the …

Secure massive MIMO systems with limited RF chains

J Zhu, W Xu, N Wang - IEEE Transactions on Vehicular …, 2016 - ieeexplore.ieee.org
In future practical deployments of massive multi-input multi-output (MIMO) systems, the
number of radio-frequency (RF) chains at the base stations (BSs) may be much smaller than …

To harvest and jam: A paradigm of self-sustaining friendly jammers for secure AF relaying

H Xing, KK Wong, Z Chu… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
This paper studies the use of multi-antenna harvest-and-jam (HJ) helpers in a multi-antenna
amplify-and-forward (AF) relay wiretap channel assuming that the direct link between the …

Robust beamforming techniques for non-orthogonal multiple access systems with bounded channel uncertainties

F Alavi, K Cumanan, Z Ding… - IEEE Communications …, 2017 - ieeexplore.ieee.org
We propose a robust beamforming design for non-orthogonal multiple access-based
multiple-input single-output downlink systems. In particular, the robust power minimization …

Secure multiuser MIMO downlink transmission via precoding-aided spatial modulation

Y Chen, L Wang, Z Zhao, M Ma… - IEEE Communications …, 2016 - ieeexplore.ieee.org
This letter generalizes the precoding-aided spatial modulation (PSM) to a multiuser (MU)
downlink scenario. With precoding vectors elaborately designed, a proposed MU-PSM …