A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

Resource allocation for cognitive radio with primary user secrecy outage constraint

D Xu, Q Li - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
We consider a cognitive radio network where multiple secondary users (SUs) coexist with a
primary user (PU). There exist multiple eavesdroppers (EAVs) who attempt to overhear the …

Optimal semiadaptive transmission with artificial-noise-aided beamforming in MISO wiretap channels

Z Li, P Mu, B Wang, X Hu - IEEE Transactions on Vehicular …, 2015 - ieeexplore.ieee.org
This paper studies the design of artificial-noise-aided (AN-aided) secure transmission in
slow-fading multiple-input–single-output (MISO) channels. We consider the scenario where …

Artificial noise-aided secure multicasting design under secrecy outage constraint

B Wang, P Mu - IEEE Transactions on Communications, 2017 - ieeexplore.ieee.org
This paper investigates the physical layer security in a multiple-input-single-output multicast
channel, where a common message is transmitted to multiple receivers and only statistical …

Secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers under secrecy outage probability constraint

P Mu, X Hu, B Wang, Z Li - IEEE Communications Letters, 2015 - ieeexplore.ieee.org
The issue of physical layer security for single-input-multiple-output (SIMO) wiretap channel
with uncoordinated cooperative jamming (UCJ) is addressed in this letter, and we focus on …

Security of an ordered-based distributive jamming scheme

A El Shafie, D Niyato… - IEEE Communications …, 2016 - ieeexplore.ieee.org
This letter proposes a new efficient yet simple distributed ordered-based jamming scheme
for securing a legitimate transmission and powering a wireless receiver equipped with a …

Dirty-paper coding based secure transmission for multiuser downlink in cellular communication systems

B Wang, P Mu - IEEE Transactions on Vehicular Technology, 2016 - ieeexplore.ieee.org
This paper studies the secure transmission in a multiuser broadcast channel where only the
statistical channel state information of the eavesdropper is available. We propose to apply …

An adaptive transmission scheme for slow fading wiretap channel with channel estimation errors

Z Li, P Mu, Z Li, W Zhang, HM Wang… - 2016 IEEE Global …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the physical-layer security of slow fading wiretap channel with
channel estimation errors. We aim to maximize the reliable secrecy rate under constraints of …

Secrecy rate maximization for SIMO wiretap channel with uncoordinated cooperative jamming under secrecy outage probability constraint

X Hu, P Mu, B Wang, Z Li, HM Wang… - 2016 IEEE Wireless …, 2016 - ieeexplore.ieee.org
A practical uncoordinated cooperative jamming (UCJ) scheme with multiple single-antenna
helpers is proposed in this paper to enhance the physical layer security of single-input …

Artificial noise aided secure multicasting design under the secrecy outage probability constraint

B Wang, P Mu, W Zhang… - GLOBECOM 2017-2017 …, 2017 - ieeexplore.ieee.org
This paper studies the artificial noise (AN) aided secure transmission design in a multiple-
input-single-output multicast channel where a common message is transmitted to multiple …