This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical layer security is to enable the …
This tutorial reviews fundamental contributions to information security. An integrative viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
The topic of information theoretic security is introduced and the principal results in this area are reviewed. The basic wire-tap channel model is considered first, and then several specific …
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart …
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has …
E Tekin, A Yener - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
The general Gaussian multiple-access wiretap channel (GGMAC-WT) and the Gaussian two- way wiretap channel (GTW-WT) are considered. In the GGMAC-WT, multiple users …
L Lai, H El Gamal - IEEE transactions on information theory, 2008 - ieeexplore.ieee.org
This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay–eavesdropper channel is introduced …
HV Poor, RF Schaefer - Proceedings of the National …, 2017 - National Acad Sciences
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems …
HM Wang, Q Yin, XG Xia - IEEE Transactions on Signal …, 2012 - ieeexplore.ieee.org
In this paper, we address the security of a two-way relay network in the presence of an eavesdropper, where each node is only equipped with single antenna. We propose two …