An overview of physical layer security with finite-alphabet signaling

SR Aghdam, A Nooraiepour… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Providing secure communications over the physical layer with the objective of achieving
secrecy without requiring a secret key has been receiving growing attention within the past …

Combating full-duplex active eavesdropper: A hierarchical game perspective

X Tang, P Ren, Y Wang, Z Han - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Security is an issue of paramount importance, yet is it a significant challenge for wireless
communications, which becomes more intricate when facing a full duplex (FD) active …

Security-constrained power allocation in MU-massive-MIMO with distributed antennas

K Guo, Y Guo, G Ascheid - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
We consider the physical layer security in a multi-user massive multiple-input multiple-output
system, where an eavesdropper (Eve) can intercept the information intended for any of the …

Generalized antenna sequence spatial modulation (GASSM): a novel framework for enhanced PHY layer security and energy efficiency

JA Obadha, PO Akuon, VK Oduol - Journal of Electrical Systems and …, 2024 - Springer
In antenna sequence spatial modulation (ASSM), the spatial and symbol domains are both
used to encode information. The sequencing of the antennas' transmissions within given …

Achievable Sum-rate of variants of QAM over Gaussian Multiple Access Channel with and

S Showkat¹, ZB Dar¹, SM Shah - Proceedings of the International …, 2024 - books.google.com
The performance of next-generation wireless systems (5G/6G and beyond) at the physical
layer is primarily driven by the choice of digital modulation techniques that are bandwidth …

Resource allocation for secure Gaussian parallel relay channels with finite-length coding and discrete constellations

L Senigagliesi, M Baldi, S Tomasin - EURASIP Journal on Wireless …, 2019 - Springer
We investigate the transmission of a secret message from Alice to Bob in the presence of an
eavesdropper (Eve) and many of decode-and-forward relay nodes. Each link comprises a …

Power allocation for AN-aided beamforming design in MISO wiretap channels with finite-alphabet signaling

X Liu, D Ma, J Xiong, W Li… - 2016 IEEE 84th Vehicular …, 2016 - ieeexplore.ieee.org
In this paper, we address physical layer security in multiple-input single-output (MISO)
wiretap channels in the presence of a passive eavesdropper. Artificial noise (AN) is used to …

Enhanced Physical Layer Security through Frequency and Spatial Diversity

II Ajayi - 2023 - theses.hal.science
Physical layer security (PLS) is an emerging paradigm that focuses on using the properties
of wireless communication, such as noise, fading, dispersion, interference, diversity, etc., to …

Optimal rotation angle for finite constellation over additive white Gaussian noise multiple access wiretap channel

SM Shah, R Riyaz, TM Wani, A Ashraf… - IET …, 2020 - Wiley Online Library
The achievable secrecy rate regions of various multi‐user channels with Gaussian inputs
are well‐known in the literature. To gain more practical insights into the achievable rates, it …

Signal Processing for Physical Layer Security With Application in Satellite Communications

A Kalantari - 2016 - orbilu.uni.lu
Wireless broadcast allows widespread and easy information transfer. However, it may
expose the information to unintended receivers, which could include eavesdroppers. As a …