A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009 - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

On the secrecy capacity of fading channels

PK Gopala, L Lai, H El Gamal - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
We consider the secure transmission of information over an ergodic fading channel in the
presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart …

Secure communication over fading channels

Y Liang, HV Poor, S Shamai - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
The fading broadcast channel with confidential messages (BCC) is investigated, where a
source node has common information for two receivers (receivers 1 and 2), and has …

The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming

E Tekin, A Yener - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
The general Gaussian multiple-access wiretap channel (GGMAC-WT) and the Gaussian two-
way wiretap channel (GTW-WT) are considered. In the GGMAC-WT, multiple users …

The relay–eavesdropper channel: Cooperation for secrecy

L Lai, H El Gamal - IEEE transactions on information theory, 2008 - ieeexplore.ieee.org
This paper establishes the utility of user cooperation in facilitating secure wireless
communications. In particular, the four-terminal relay–eavesdropper channel is introduced …

Wireless physical layer security

HV Poor, RF Schaefer - Proceedings of the National …, 2017 - National Acad Sciences
Security in wireless networks has traditionally been considered to be an issue to be
addressed separately from the physical radio transmission aspects of wireless systems …

Distributed beamforming for physical-layer security of two-way relay networks

HM Wang, Q Yin, XG Xia - IEEE Transactions on Signal …, 2012 - ieeexplore.ieee.org
In this paper, we address the security of a two-way relay network in the presence of an
eavesdropper, where each node is only equipped with single antenna. We propose two …