Multiuser MIMO concept for physical layer security in multibeam satellite systems

MG Schraml, RT Schwarz… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In satellite communication downlinks, physical layer security is challenging to achieve due to
their broadcasting nature and Line-of-Sight channel characteristics. This paper provides a …

Secrecy transmission with a helper: To relay or to jam

H Deng, HM Wang, W Guo… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In this paper, we consider the problem of secure communications for a four-node system
consisting of one source, one destination, one eavesdropper, and one helper. We …

Statistical analysis and minimization of security vulnerability region in amplify-and-forward cooperative systems

A Behnad, MB Shahbaz, TJ Willink… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Secrecy rate achievability in three-node amplify-and-forward cooperative systems at the
presence of passive eavesdroppers without location information is statistically analyzed and …

Characterization of the secrecy region of a single relay cooperative system

N Marina, A Hjorungnes - 2010 IEEE Wireless Communication …, 2010 - ieeexplore.ieee.org
Security is an important aspect for the future wireless networks. Since the number of network
nodes increases constantly, and, in addition, the networks are decentralized and ad-hoc in …

移动通信系统平均物理层安全容量

李涛, 张焱, 许希斌, 周世东 - 清华大学学报: 自然科学版, 2015 - cqvip.com
为提升移动通信系统的安全性, 研究了用户移动时的平均物理层安全容量. 在实际传播环境中,
用户移动会导致物理层安全容量在大范围内变化, 因此提出合法用户平均物理层安全容量以刻画 …

On the optimum secrecy capacity of multiple relay networks

MNY Koli, MZI Sarkar, S Tazrin… - 2014 17th International …, 2014 - ieeexplore.ieee.org
We consider a confidential communication system in which a source sends a confidential
information to the destination in the presence of an eavesdropper. Multiple relays are used …

Secure wireless communications via exhaustive cooperative jamming against a single eavesdropper

TD Stojanovski, N Marina - 2012 20th Telecommunications …, 2012 - ieeexplore.ieee.org
The use of multiple network configurations for cooperative jamming with the aim to increase
the region with information-theoretic secrecy is analysed. The case with a single …

Increasing the information-theoretic secrecy by cooperative relaying and jamming

N Marina, TD Stojanovski… - 2012 50th Annual Allerton …, 2012 - ieeexplore.ieee.org
The use of cooperation to increase the information-theoretic secrecy in a decentralized ad-
hoc wireless network is investigated. In particular, four cases of cooperative relaying are …

Enforce truth-telling in wireless relay networks for secure communication

S Liu, R Zhang, L Song, Z Han… - 2011 IEEE Conference on …, 2011 - ieeexplore.ieee.org
To ensure security in data transmission is one of the most important issues for wireless relay
networks. In this paper, we consider a cooperative network, consisting of one source node …

[PDF][PDF] Research Article Secure Wireless Communications via Cooperative Transmitting

TD Stojanovski, N Marina - academia.edu
Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key
exchange protocol for wireless networks. A network of transmitters, which already have …