A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

On the design of secure non-orthogonal multiple access systems

B He, A Liu, N Yang, VKN Lau - IEEE Journal on Selected …, 2017 - ieeexplore.ieee.org
This paper proposes a new design of non-orthogonal multiple access (NOMA) under
secrecy considerations. We focus on a NOMA system, where a transmitter sends confidential …

Physical layer security in multi-antenna cellular systems: Joint optimization of feedback rate and power allocation

L Sun, X Tian - IEEE Transactions on Wireless …, 2022 - ieeexplore.ieee.org
This paper comprehensively studies the physical layer security in frequency division duplex
multi-antenna cellular systems, where the multi-antenna base stations (BSs), legitimate …

Interference alignment for physical layer security in multi-user networks with passive eavesdroppers

L Hu, S Tan, H Wen, J Wu, J Fan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We investigate the physical layer security (PLS) in multi-user interference networks. In
particular, we consider secure transmission from a legitimate source (Alice) to a legitimate …

Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming

L Hu, B Wu, J Tang, F Pan… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
In this paper, we consider physical layer security in wireless communication networks in
which a source (Alice) intends to send a confidential message to a legitimate destination …

Secure beamforming for untrusted MISO cognitive radio networks

M Zhang, Y Liu - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
In this paper, we study the secure beamforming design for a cognitive radio network (CRN),
where a primary transmitter-receiver pair coexists with an untrusted secondary transmitter …

Artificial-noise-aided coordinated secure transmission design in multi-cell multi-antenna networks with limited feedback

Z Tang, L Sun, X Tian, D Niyato… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we consider secure communications in a multi-cell downlink multi-antenna
system, where each multi-antenna base station (BS) sends confidential messages to one …

Adaptive base station cooperation for physical layer security in two-cell wireless networks

L Hu, H Wen, B Wu, J Tang, F Pan - IEEE Access, 2016 - ieeexplore.ieee.org
We study physical layer security in two-cell wireless networks in which a base station (Alice)
intends to send a confidential message to a legitimate user (Bob) with the help of a …

Optimal power allocation for secrecy rate maximization in broadcast wiretap channels

H Song, H Wen, L Hu, Y Chen… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
We investigate physical layer security in wireless communication networks, where a
transmitter Alice sends a confidential message to an intended user Bob, while coexisting …

Conferencing in Wyner's asymmetric interference network: Effect of number of rounds

M Wigger, R Timo, SS Shitz - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
We determine the exact per-user multiplexing gain (MG) of Wyner's soft-handoff network
model when neighbouring transmitters and neighbouring receivers can communicate over …