A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

On the design of secure non-orthogonal multiple access systems

B He, A Liu, N Yang, VKN Lau - IEEE Journal on Selected …, 2017 - ieeexplore.ieee.org
This paper proposes a new design of non-orthogonal multiple access (NOMA) under
secrecy considerations. We focus on a NOMA system, where a transmitter sends confidential …

Physical layer security in downlink multi-antenna cellular networks

G Geraci, HS Dhillon, JG Andrews… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
In this paper, we study physical layer security for the downlink of cellular networks, where
the confidential messages transmitted to each mobile user can be eavesdropped by both; 1) …

Spatial sparsity based secure transmission strategy for massive MIMO systems against simultaneous jamming and eavesdropping

Z Shen, K Xu, X Xia, W Xie… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we investigate the interactions between a base station (BS) and a full-duplex
(FD) active eavesdropper in the uplink of multi-cell massive multiple-input multiple-output …

Artificial-noise-aided transmission in multi-antenna relay wiretap channels with spatially random eavesdroppers

C Liu, N Yang, R Malaney… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We design a new relay-aided secure transmission scheme, in which a source communicates
with a destination through a trusted decode-and-forward relay in the presence of spatially …

Location-based beamforming and physical layer security in Rician wiretap channels

C Liu, R Malaney - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
We propose a new location-based beamforming (LBB) scheme for wiretap channels, where
a multi-antenna source communicates with a single-antenna legitimate receiver in the …

Beam domain secure transmission for massive MIMO communications

W Wu, X Gao, Y Wu, C Xiao - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
We investigate the optimality and power allocation algorithm of beam domain transmission
for single-cell massive multiple-input multiple-output (MIMO) systems with a multi-antenna …

Secure Linear Precoding in Overloaded MU-MIMO Wireless Networks

M Krunz, P Siyari - IEEE Transactions on Communications, 2023 - ieeexplore.ieee.org
We investigate signaling and linear precoding designs for secure downlink communications
in a multiuser MIMO (MU-MIMO) network. The network is tapped by an external …

Secure downlink transmission in the Internet of Things: How many antennas are needed?

J Hu, N Yang, Y Cai - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
Physical layer security is a promising way to secure the wireless communications in the
Internet of Things (IoT). Motivated by the fact that the limited feedback resources in the IoT …

Jammer-assisted resource allocation in secure OFDMA with untrusted users

R Saini, A Jindal, S De - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
In this paper, we consider the problem of resource allocation in the orthogonal frequency
division multiple access system with single source and M untrusted users in presence of a …