Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

A survey of optimization approaches for wireless physical layer security

D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …

[图书][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

Robust beamforming for secure communication in systems with wireless information and power transfer

DWK Ng, ES Lo, R Schober - IEEE Transactions on Wireless …, 2014 - ieeexplore.ieee.org
This paper considers a multiuser multiple-input single-output (MISO) downlink system with
simultaneous wireless information and power transfer. In particular, we focus on secure …

Dual-UAV-enabled secure communications: Joint trajectory design and user scheduling

Y Cai, F Cui, Q Shi, M Zhao… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
In this paper, we investigate a novel unmanned aerial vehicle (UAV)-enabled secure
communication system. Two UAVs are applied in this system where one UAV moves around …

Low-energy security: Limits and opportunities in the internet of things

W Trappe, R Howard, RS Moore - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Many new" networkable" devices, which constitute the Internet of Things, are low energy and
lightweight. These devices must devote most of their available energy and computation to …

The challenges facing physical layer security

W Trappe - IEEE communications magazine, 2015 - ieeexplore.ieee.org
There has recently been significant interest in applying the principles of information-
theoretical security and signal processing to secure physical layer systems. Although the …

Optimal resource allocation in coordinated multi-cell systems

E Björnson, E Jorswieck - Foundations and Trends® in …, 2013 - nowpublishers.com
The use of multiple antennas at base stations is a key component in the design of cellular
communication systems that can meet high-capacity demands in the downlink. Under ideal …