An overview of physical layer security in wireless communication systems with CSIT uncertainty

A Hyadi, Z Rezki, MS Alouini - IEEE Access, 2016 - ieeexplore.ieee.org
The concept of physical layer security builds on the pivotal idea of turning the channel's
imperfections, such as noise and fading, into a source of security. This is established …

Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach

Y Deng, L Wang, M Elkashlan… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
This paper develops a tractable framework for exploiting the potential benefits of physical
layer security in three-tier wireless sensor networks (WSNs) using stochastic geometry. In …

Secrecy performance of MIMO Nakagami‐m wiretap channels with optimal TAS and different antenna schemes

DB da Costa, NS Ferdinand, US Dias… - Transactions on …, 2016 - Wiley Online Library
Transmit antenna selection (TAS) in wiretap channels has arisen as a simple promising
scheme to improve physical layer security. However, up to now, TAS schemes have aimed …

Secrecy capacity scaling in large cooperative wireless networks

M Mirmohseni… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We investigate large wireless networks subject to security constraints. In contrast to point-to-
point, interference-limited communications considered in prior works, we propose active …

Secure outage performance of zero-forcing beamforming with “torch nodes”

Y Choi, J Shin, D Kim - 2016 International Symposium ELMAR, 2016 - ieeexplore.ieee.org
This paper proposes a novel usage of zero-forcing beamforming (ZFB) for secure
transmission in multiple-input single-output (MISO) wiretap channels. When using ZFB for …

Secure communication in wiretap channels with partial and statistical CSI at the transmitter

E Jorswieck, PH Lin, S Engelmann, A Wolf - Physical and data-link security …, 2016 - Springer
One major challenge in physical layer security for confidential communication is the lack of
channel state information at the transmitter about the channel to the passive eavesdropper …