A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

Interference management issues for the future 5G network: a review

F Qamar, MHDN Hindia, K Dimyati, KA Noordin… - Telecommunication …, 2019 - Springer
Abstract The future wireless Fifth Generation (5G) communication network required a higher
bandwidth in order to achieve greater data rate. It will be largely characterized by small cell …

Secure rate splitting multiple access: How much of the split signal to reveal?

A Salem, C Masouros, B Clerckx - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Rate Splitting Multiple Access (RSMA) relies on multi-antenna rate splitting (RS) at the
transmitter and successive interference cancellation (SIC) at the receiver. In RS the users' …

Large-scale MIMO relaying techniques for physical layer security: AF or DF?

X Chen, L Lei, H Zhang, C Yuen - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we consider a large scale multiple input multiple output (LS-MIMO) relaying
system, where an information source sends the message to its intended destination aided by …

An overview of physical layer security in wireless communication systems with CSIT uncertainty

A Hyadi, Z Rezki, MS Alouini - IEEE Access, 2016 - ieeexplore.ieee.org
The concept of physical layer security builds on the pivotal idea of turning the channel's
imperfections, such as noise and fading, into a source of security. This is established …

Resource allocation for a massive MIMO relay aided secure communication

J Chen, X Chen, WH Gerstacker… - Ieee transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we address the problem of joint power and time allocation for secure
communications in a decode-and-forward massive multiple-input multiple-output (M-MIMO) …

Joint beamforming and power allocation for secrecy in peer-to-peer relay networks

C Wang, HM Wang, DWK Ng, XG Xia… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper investigates the physical-layer security of a multiuser peer-to-peer (MUP2P) relay
network for amplify-and-forward (AF) protocol, where a secure user and other unclassified …

Physical layer security for massive access in cellular Internet of Things

Q Qi, X Chen, C Zhong, Z Zhang - Science China Information Sciences, 2020 - Springer
The upcoming fifth generation (5G) cellular network is required to provide seamless access
for a massive number of Internet of Things (IoT) devices over the limited radio spectrum. In …

Large-system analysis of artificial-noise-assisted communication in the multiuser downlink: Ergodic secrecy sum rate and optimal power allocation

N Li, X Tao, H Wu, J Xu, Q Cui - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Security and privacy have become increasingly critical demands in wireless networks,
which, however, are particularly susceptible to eavesdropping attacks due to the broadcast …

Secrecy Analysis of Random MIMO Wireless Networks Over - Fading Channels

L Kong, S Vuppala, G Kaddoum - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we investigate the secrecy performance of stochastic multiple-input multiple-
output wireless networks over small-scale α-μ fading channels, where both the legitimate …