Physical Layer Secure Data Transmission for Mobile Edge Computing: Beamforming and Artificial Noise

[1]  Guang Gong,et al.  Physical layer assisted authentication for distributed ad hoc wireless sensor networks , 2010, IET Inf. Secur..

[2]  Hong Wen,et al.  Internet of Things Based Smart Grids Supported by Intelligent Edge Computing , 2019, IEEE Access.

[3]  Yushan Li,et al.  Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things , 2018, IEEE Internet of Things Journal.

[4]  Hong Wen,et al.  Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.

[5]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Xiaohua Li,et al.  Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions , 2007, J. Commun..

[8]  Hong Wen,et al.  A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT) , 2015, IEEE Transactions on Emerging Topics in Computing.

[9]  Alexander M. Haimovich,et al.  Performance analysis of optimum combining in wireless communications with Rayleigh fading and cochannel interference , 1998, IEEE Trans. Commun..

[10]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[11]  Hong Wen,et al.  Framework for MIMO cross-layer secure communication based on STBC , 2011, Telecommunication Systems.

[12]  Lin Ding,et al.  Cryptanalysis of Lightweight WG-8 Stream Cipher , 2014, IEEE Transactions on Information Forensics and Security.

[13]  Hong Wen,et al.  Physical layer assist authentication technique for smart meter system , 2013, IET Commun..

[14]  Hong Wen,et al.  Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions , 2014, IEEE Wireless Communications Letters.

[15]  Hong Wen,et al.  A framework of the PHY-layer approach to defense against security threats in cognitive radio networks , 2013, IEEE Network.

[16]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.