A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Joint beamforming for secure communication in cognitive satellite terrestrial networks

M Lin, Z Lin, WP Zhu, JB Wang - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
This paper investigates the secure communication of a cognitive satellite terrestrial network
with software-defined architecture, where a gateway is acting as a control center to offer the …

Relay-assisted proactive eavesdropping with cooperative jamming and spoofing

J Moon, H Lee, C Song, S Kang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we consider a legitimate proactive eavesdropping scenario where a distant
central monitor covertly wiretaps the communication between a pair of suspicious users via …

Proactive eavesdropping with full-duplex relay and cooperative jamming

J Moon, H Lee, C Song, S Lee… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we consider a proactive eavesdropping scenario, where a central monitor tries
to intercept the information exchanged between a pair of suspicious entities through amplify …

Secrecy performance of untrusted relay systems with a full-duplex jamming destination

R Zhao, X Tan, DH Chen, YC He… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
To improve the secrecy performance of the untrusted relay system with a multiple-antenna
destination, a novel full-duplex destination jamming scheme with optimal antenna selection …

Artificial noise aided precoding with imperfect CSI in full-duplex relaying secure communications

Y Li, R Zhao, Y Wang, G Pan, C Li - IEEE Access, 2018 - ieeexplore.ieee.org
In Rayleigh fading channels, to enhance the secrecy performance of wireless
communication systems and efficiently disturb the interception of eavesdroppers, the …

Antenna mode switching for full-duplex destination-based jamming secure transmission

Y Li, R Zhao, L Fan, A Liu - IEEE Access, 2018 - ieeexplore.ieee.org
We investigate the secrecy rate optimization problem in a wiretap channel with a single-
antenna source, a single-antenna eavesdropper, and a multiple-antenna full-duplex (FD) …

[PDF][PDF] 全双工加扰的非可信中继系统的渐近性能分析

赵睿, 谭星, 李元健, 贺玉成… - Journal on …, 2018 - infocomm-journal.com
在物理层安全领域, 协作中继技术因具备提升网络容量和扩展网络覆盖范围等优点,
受到学术界广泛关注. 但是, 协作中继在某些时候可能存在非可信情形. 基于此 …

Adaptive resource allocation for secure two-hop relaying communication

KT Phan, Y Hong, E Viterbo - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
In this paper, we develop novel transmission schemes for secure dual-hop Alice-Ray-Bob
relaying communication over fading channels in the presence of a passive eavesdropper …

Multiple amplify-and-forward full-duplex relays for legitimate eavesdropping

J Moon, H Lee, C Song, I Lee - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
In this paper, we consider a legitimate proactive eavesdropping scenario where a central
monitor tries to intercept the information exchanged between a pair of suspicious entities …