Linear precoding of data and artificial noise in secure massive MIMO systems

J Zhu, R Schober, VK Bhargava - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we consider secure downlink transmission in a multicell massive multiple-input
multiple-output (MIMO) system where the numbers of base station (BS) antennas, mobile …

Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- Channels

H Lei, C Gao, IS Ansari, Y Guo, Y Zou… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
This paper considers a multiple-input-multiple-output (MIMO) cognitive wiretap system over
Nakagami-m channels with generalized selection combining (GSC), where confidential …

Toward improved offloading efficiency of data transmission in the IoT-cloud by leveraging secure truncating OFDM

M Jia, Z Yin, D Li, Q Guo, X Gu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Cloud computing provides powerful computing ability of mobile devices in the Internet of
Things (IoT) networks. However, the large amounts of data interaction with cloud suffers …

Movable Antennas-Assisted Secure Transmission Without Eavesdroppers' Instantaneous CSI

G Hu, Q Wu, D Xu, K Xu, J Si, Y Cai… - arXiv preprint arXiv …, 2024 - arxiv.org
Movable antenna (MA) technology is highly promising for improving communication
performance, due to its advantage of flexibly adjusting positions of antennas to reconfigure …

Secure switch-and-stay combining (SSSC) for cognitive relay networks

L Fan, S Zhang, TQ Duong… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we study a two-phase underlay cognitive relay network, where there exists an
eavesdropper who can overhear the message. The secure data transmission from the …

Secure Vehicular Communications With Varying QoS and Environments: A Unified Cross-Layer Policy-Adaptation Approach

Y Xiao, Q Du, Y Zhang, C Lu - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
With the ubiquitous connectivity in internet of vehicles, secure transmission is of vital
importance for intelligent vehicle-to-everything (V2X) communications. However, in order to …

Secure communications in multiple amplify‐and‐forward relay networks with outdated channel state information

D Deng, L Fan, R Zhao, RQ Hu - Transactions on Emerging …, 2016 - Wiley Online Library
This paper studies the effect of outdated channel state information on relay selection for a
secure amplify‐and‐forward relay network. In the considered system, one of the multiple …

Exploiting opportunistic scheduling in uplink wiretap networks

X Ge, H Jin, J Zhu, J Cheng… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Opportunistic scheduling schemes are investigated for uplink wiretap channels with multiple
asymmetrically located legitimate users (LUs) and eavesdroppers. To exploit multiuser …

Movable Antennas-Enabled Two-User Multicasting: Do We Really Need Alternating Optimization for Minimum Rate Maximization?

G Hu, Q Wu, D Xu, K Xu, J Si, Y Cai… - arXiv preprint arXiv …, 2024 - arxiv.org
Movable antenna (MA) technology, which can reconfigure wireless channels by flexibly
moving antenna positions in a specified region, has great potential for improving …

Channel-based mapping diversity for enhancing the physical layer security in the Internet of Things

SV Pechetti, A Jindal, R Bose - 2017 IEEE 28th Annual …, 2017 - ieeexplore.ieee.org
Demand of minimal hardware requirement and low energy consumption for internet of things
(IoT) has gained the importance of techniques enhancing the physical layer security …