[图书][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

Optimal relay selection for physical-layer security in cooperative wireless networks

Y Zou, X Wang, W Shen - IEEE journal on selected areas in …, 2013 - ieeexplore.ieee.org
In this paper, we explore the physical-layer security in cooperative wireless networks with
multiple relays where both amplify-and-forward (AF) and decode-and-forward (DF) protocols …

Improving wireless physical layer security via cooperating relays

L Dong, Z Han, AP Petropulu… - IEEE transactions on …, 2009 - ieeexplore.ieee.org
Physical (PHY) layer security approaches for wireless communications can prevent
eavesdropping without upper layer data encryption. However, they are hampered by …

Cognitive radios: A survey on spectrum sensing, security and spectrum handoff

V Ramani, SK Sharma - China Communications, 2017 - ieeexplore.ieee.org
Pervasive wireless computing and communication have created an ever-increasing demand
for more radio spectrum. Since, most of the spectrum is underutilized, it motivated the …

Secure communication over fading channels

Y Liang, HV Poor, S Shamai - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
The fading broadcast channel with confidential messages (BCC) is investigated, where a
source node has common information for two receivers (receivers 1 and 2), and has …

Relay-selection improves the security-reliability trade-off in cognitive radio systems

Y Zou, B Champagne, WP Zhu… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We consider a cognitive radio (CR) network consisting of a secondary transmitter (ST), a
secondary destination (SD) and multiple secondary relays (SRs) in the presence of an …

On cooperative relaying schemes for wireless physical layer security

J Li, AP Petropulu, S Weber - IEEE transactions on signal …, 2011 - ieeexplore.ieee.org
We consider a cooperative wireless network in the presence of one or more eavesdroppers,
and exploit node cooperation for achieving physical (PHY) layer based security. Two …

Cooperative jamming for secure communications in MIMO relay networks

J Huang, AL Swindlehurst - IEEE Transactions on Signal …, 2011 - ieeexplore.ieee.org
Secure communications can be impeded by eavesdroppers in conventional relay systems.
This paper proposes cooperative jamming strategies for two-hop relay networks where the …

Cooperation with an untrusted relay: A secrecy perspective

X He, A Yener - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
We consider the communication scenario where a source-destination pair wishes to keep
the information secret from a relay node despite wanting to enlist its help. For this scenario …

Security versus reliability analysis of opportunistic relaying

Y Zou, X Wang, W Shen, L Hanzo - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Physical-layer security is emerging as a promising paradigm of securing wireless
communications against eavesdropping between legitimate users, when the main link …