Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
暂无分享,去创建一个
[1] Hlaing Minn,et al. Artificial Noise Aided Hybrid Precoding Design for Secure mmWave MISO Systems With Partial Channel Knowledge , 2017, IEEE Signal Processing Letters.
[2] Haji M. Furqan,et al. Secret key generation using channel quantization with SVD for reciprocal MIMO channels , 2016, 2016 International Symposium on Wireless Communication Systems (ISWCS).
[3] Havish Koorapaty,et al. Secure information transmission for mobile radio , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[4] Colleen Swanson,et al. SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks , 2014, 2014 IEEE Symposium on Security and Privacy.
[5] Jia Zhu,et al. Transmit antenna selection to improve physical layer security for MIMO-CR systems , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).
[6] M. Daly,et al. Directional Modulation Technique for Phased Arrays , 2009, IEEE Transactions on Antennas and Propagation.
[7] Cong Ling,et al. Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.
[8] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[9] Zhijin Qin,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[10] Xiaobo Li,et al. An Artificial Noise Scheme for Secure Communication in Heterogeneous D2D and Cellular Networks , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).
[11] Miaowen Wen,et al. Secrecy-Enhancing Scheme for Spatial Modulation , 2018, IEEE Communications Letters.
[12] Tolga M. Duman,et al. Randomized Convolutional Codes for the Wiretap Channel , 2017, IEEE Transactions on Communications.
[13] Lin Zhang,et al. Design and Analysis of Physical Layer Security Based on Ill-Posed Theory for Optical OFDM-Based VLC System Over Real-Valued Visible Light Channel , 2016, IEEE Photonics Journal.
[14] Victor C. M. Leung,et al. Physical layer security issues in interference- alignment-based wireless networks , 2016, IEEE Communications Magazine.
[15] Erchin Serpedin,et al. A comparative review on the wireless implantable medical devices privacy and security , 2014, 2014 4th International Conference on Wireless Mobile Communication and Healthcare - Transforming Healthcare Through Innovations in Mobile and Wireless Technologies (MOBIHEALTH).
[16] Lie-Liang Yang,et al. Secret Precoding-Aided Spatial Modulation , 2015, IEEE Communications Letters.
[17] Sung-Ju Lee,et al. STROBE: Actively securing wireless communications using Zero-Forcing Beamforming , 2012, 2012 Proceedings IEEE INFOCOM.
[18] Victor C. M. Leung,et al. Artificial Noise Assisted Secure Interference Networks With Wireless Power Transfer , 2017, IEEE Transactions on Vehicular Technology.
[19] K. Cumanan,et al. Limited Feedback Scheme for Device-to-Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints , 2017, IEEE Transactions on Vehicular Technology.
[20] Rafael F. Schaefer,et al. Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.
[21] Yi Hong,et al. Practical Secrecy using Artificial Noise , 2013, IEEE Communications Letters.
[22] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[23] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[24] H. Vincent Poor,et al. Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.
[25] Yueming Cai,et al. Resource allocation for physical layer security in cooperative OFDM networks , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[26] Wei-Ping Zhu,et al. Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.
[27] Huiming Wang,et al. Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.
[28] Sennur Ulukus,et al. Polar Coding for the General Wiretap Channel With Extensions to Multiuser Scenarios , 2016, IEEE Journal on Selected Areas in Communications.
[29] Victor C. M. Leung,et al. Securing Uplink Transmission for Lightweight Single-Antenna UEs in the Presence of a Massive MIMO Eavesdropper , 2016, IEEE Access.
[30] H. Vincent Poor,et al. Finite-blocklength bounds for wiretap channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[31] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[32] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels II: the simulatability condition , 2003, IEEE Trans. Inf. Theory.
[33] Georges Kaddoum,et al. On the Physical Layer Security Analysis of Hybrid Millimeter Wave Networks , 2018, IEEE Transactions on Communications.
[34] Li Wang,et al. Secrecy Enhancement Analysis Against Unknown Eavesdropping in Spatial Modulation , 2015, IEEE Communications Letters.
[35] Junqing Zhang,et al. Design of an OFDM Physical Layer Encryption Scheme , 2017, IEEE Transactions on Vehicular Technology.
[36] Achilleas Anastasopoulos,et al. Capacity achieving LDPC codes through puncturing , 2005, 2005 International Conference on Wireless Networks, Communications and Mobile Computing.
[37] C.-C. Jay Kuo,et al. Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems , 2013, Springer Briefs in Electrical and Computer Engineering.
[38] Khairi Ashour Hamdi,et al. A low-complexity antenna subset modulation for secure millimeter-wave communication , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[39] H. Sasaoka,et al. A Private Key Agreement Scheme Based on Fluactions of BER in wireless Communications , 2007, The 9th International Conference on Advanced Communication Technology.
[40] Kui Ren,et al. Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.
[41] Mohamed-Slim Alouini,et al. An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty , 2016, IEEE Access.
[42] Yi Hong,et al. Unshared Secret Key Cryptography , 2014, IEEE Transactions on Wireless Communications.
[43] Jie Yang,et al. Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation , 2014, IEEE Transactions on Mobile Computing.
[44] Alexander Vardy,et al. Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.
[45] Jeffrey H. Reed,et al. PHY-Layer Resiliency in OFDM Communications: A Tutorial , 2015, IEEE Communications Surveys & Tutorials.
[46] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[47] Bin Li,et al. Secrecy Energy Efficiency Analysis of UAV-Enabled Communication Networks , 2017, ArXiv.
[48] Taewon Hwang,et al. Energy Efficient Communication for Secure D2D Underlaid Cellular Networks , 2017, IEEE Transactions on Vehicular Technology.
[49] Alex Reznik,et al. On the Secrecy Capabilities of ITU Channels , 2007, 2007 IEEE 66th Vehicular Technology Conference.
[50] Qian Xu,et al. Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions , 2017, IEEE Internet of Things Journal.
[51] Alexander Barg,et al. Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component , 2015, ITW.
[52] Vincent K. N. Lau,et al. On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.
[53] Wang Li,et al. Security-oriented transmission based on cooperative relays in cognitive radio , 2013, China Communications.
[54] H. Vincent Poor,et al. Secure Nested Codes for Type II Wiretap Channels , 2007, 2007 IEEE Information Theory Workshop.
[55] Marco Baldi,et al. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[56] Masahide Sasaki,et al. Numerical Study on Secrecy Capacity and Code Length Dependence of the Performances in Optical Wiretap Channels , 2015, IEEE Photonics Journal.
[57] Wenjiang Feng,et al. Cognitive radio network secure communication with and without cooperative jammer , 2014, 2014 International Conference on Advanced Technologies for Communications (ATC 2014).
[58] Tharmalingam Ratnarajah,et al. An Analysis on Secure Communication in Millimeter/Micro-Wave Hybrid Networks , 2016, IEEE Transactions on Communications.
[59] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[60] Mohamed Azab,et al. Survey on Security Issues in Vehicular Ad Hoc Networks , 2015 .
[61] Gill R. Tsouri,et al. Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography , 2016, IEEE Journal of Biomedical and Health Informatics.
[62] Bingli Jiao,et al. Secure Multiuser MIMO Downlink Transmission Via Precoding-Aided Spatial Modulation , 2016, IEEE Communications Letters.
[63] Xinbing Wang,et al. Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.
[64] Tony Q. S. Quek,et al. Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.
[65] Onur Ozan Koyluoglu,et al. Polar coding for secure transmission and key agreement , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[66] Qinye Yin,et al. Secure Transmissions in Millimeter Wave Systems , 2017, IEEE Transactions on Communications.
[67] Alex Reznik,et al. Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.
[68] Frédérique E. Oggier,et al. Lattice Codes for the Wiretap Gaussian Channel: Construction and Analysis , 2016, IEEE Trans. Inf. Theory.
[69] Ender Tekin,et al. The Gaussian multiple access wire-tap channel: wireless secrecy and cooperative jamming , 2007, 2007 Information Theory and Applications Workshop.
[70] Khairi Ashour Hamdi,et al. Switched Phased-Array Transmission Architecture for Secure Millimeter-Wave Wireless Communication , 2016, IEEE Transactions on Communications.
[71] Xiang-Gen Xia,et al. A wireless secret key generation method based on Chinese remainder theorem in FDD systems , 2012, Science China Information Sciences.
[72] Lutz H.-J. Lampe,et al. Physical-Layer Security for MISO Visible Light Communication Channels , 2015, IEEE Journal on Selected Areas in Communications.
[73] Dennis L. Goeckel,et al. Wireless physical-layer security performance of UWB systems , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[74] Shlomi Arnon. Visible Light Communication: Synchronization issues in visible light communication , 2015 .
[75] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[76] Rachad Atat,et al. On the Achievable Transmission Capacity of Secrecy-Based D2D Cellular Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[77] Kaizhi Huang,et al. Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).
[78] Rudolf Ahlswede,et al. Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.
[79] Hu Jin,et al. Combined antenna selection and beamforming for secure transmission in distributed antenna systems , 2013, 2013 International Conference on ICT Convergence (ICTC).
[80] Montserrat Ros,et al. A Comparative Survey of VANET Clustering Techniques , 2017, IEEE Communications Surveys & Tutorials.
[81] Xudong Wang,et al. Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.
[82] Sanjeev Jain,et al. A survey on device-to-device (D2D) communication: Architecture and security issues , 2017, J. Netw. Comput. Appl..
[83] Yueming Cai,et al. Power allocation in a secure-aware device-to-device communication underlaying cellular network , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).
[84] M. Taki,et al. Spectral efficiency optimized secure broadcasting using adaptive modulation, coding and transmit power , 2013, 2013 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA).
[85] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[86] Stark C. Draper,et al. Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.
[87] Stephan Ludwig,et al. Secret key generation from static channels with untrusted relays , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[88] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[89] Chiara Buratti,et al. A Survey on Wireless Body Area Networks: Technologies and Design Challenges , 2014, IEEE Communications Surveys & Tutorials.
[90] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[91] Haji M. Furqan,et al. Secure communication via untrusted switchable decode-and-forward relay , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[92] Andrew Thangaraj,et al. Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.
[93] Jianwei Xie,et al. Secure degrees of freedom of the Gaussian wiretap channel with helpers , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[94] George K. Karagiannidis,et al. Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks , 2017, IEEE Access.
[95] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[96] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[97] Xiaohui Zhang,et al. Physical-Layer Secrecy Performance in Finite Blocklength Case , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[98] Jamie S. Evans,et al. Secrecy rate maximization for cooperative overlay cognitive radio networks with artificial noise , 2014, 2014 IEEE International Conference on Communications (ICC).
[99] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[100] Jiaheng Wang,et al. Security Enhancement via Device-to-Device Communication in Cellular Networks , 2016, IEEE Signal Processing Letters.
[101] Mohamed-Slim Alouini,et al. Improved achievable secrecy rate of visible light communication with cooperative jamming , 2015, 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[102] A. Hajimiri,et al. Transmitter Architectures Based on Near-Field Direct Antenna Modulation , 2008, IEEE Journal of Solid-State Circuits.
[103] Tao Zhang,et al. Secure Multiantenna Cognitive Wiretap Networks , 2017, IEEE Transactions on Vehicular Technology.
[104] Julian Cheng,et al. Physical-Layer Security for Indoor Visible Light Communications: Secrecy Capacity Analysis , 2018, IEEE Transactions on Communications.
[105] Jing Wang,et al. Joint power allocation and artificial noise design for multiuser wiretap OFDM channels , 2013, 2013 IEEE International Conference on Communications (ICC).
[106] Gerhard Kramer,et al. Effective secrecy: Reliability, confusion and stealth , 2013, 2014 IEEE International Symposium on Information Theory.
[107] Yueming Cai,et al. On the secrecy mutual information of spatial modulation with finite alphabet , 2012, 2012 International Conference on Wireless Communications and Signal Processing (WCSP).
[108] Mohamed-Slim Alouini,et al. On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.
[109] Mohamed-Slim Alouini,et al. On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.
[110] R. Negi,et al. Secret communication in presence of colluding eavesdroppers , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[111] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[112] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[113] Mohamed-Slim Alouini,et al. On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.
[114] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[115] Dennis Goeckel,et al. Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy , 2013, 2013 IEEE International Symposium on Information Theory.
[116] Huiming Wang,et al. On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[117] Hüseyin Arslan,et al. Secure communication in frequency selective channels with fade-avoiding subchannel usage , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[118] Syed Taha Ali,et al. Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.
[119] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[120] Qinye Yin,et al. Safeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers , 2018, IEEE Transactions on Wireless Communications.
[121] Zhi Chen,et al. Secure D2D-enabled cellular communication against selective eavesdropping , 2017, 2017 IEEE International Conference on Communications (ICC).
[122] Hlaing Minn,et al. Hybrid Analog–Digital Precoding Design for Secrecy mmWave MISO-OFDM Systems , 2017, IEEE Transactions on Communications.
[123] Marco Baldi,et al. Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[124] Wayne P. Burleson,et al. REFLEX: Reconfigurable logic for entropy extraction , 2014, 2014 27th IEEE International System-on-Chip Conference (SOCC).
[125] Xuemin Shen,et al. Cooperative Spectrum Access Towards Secure Information Transfer for CRNs , 2013, IEEE Journal on Selected Areas in Communications.
[126] Mohsen Guizani,et al. Mapping-Varied Spatial Modulation for Physical Layer Security: Transmission Strategy and Secrecy Rate , 2018, IEEE Journal on Selected Areas in Communications.
[127] Junqing Zhang,et al. Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.
[128] Yu Cheng,et al. Secure key establishment for Device-to-Device communications , 2014, 2014 IEEE Global Communications Conference.
[129] H. Vincent Poor,et al. On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming , 2016, IEEE Transactions on Communications.
[130] Mohamed-Slim Alouini,et al. On the Finite-SNR Diversity-Multiplexing Tradeoff of Zero-Forcing Transmit Scheme under Secrecy Constraint , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[131] Jun Zhou,et al. Secure transmission for AF relaying spectrum-sharing systems with collaborative distributed beamforming , 2016, 2016 25th Wireless and Optical Communication Conference (WOCC).
[132] Wenfei Liu,et al. Transmit filter and artificial noise aided physical layer security for OFDM systems , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).
[133] Ming Li,et al. Hybrid Precoder and Combiner Design for Secure Transmission in mmWave MIMO Systems , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[134] Xiangjie Kong,et al. A Social-Aware Group Formation Framework for Information Diffusion in Narrowband Internet of Things , 2018, IEEE Internet of Things Journal.
[135] A. M. Tonello,et al. Physical layer security in PLC networks: Achievable secrecy rate and channel effects , 2013, 2013 IEEE 17th International Symposium on Power Line Communications and Its Applications.
[136] Ness B. Shroff,et al. Secrecy outage capacity of fading channels , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).
[137] Liu,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[138] Naofal Al-Dhahir,et al. Secure Sum-Rate-Optimal MIMO Multicasting Over Medium-Voltage NB-PLC Networks , 2018, IEEE Transactions on Smart Grid.
[139] Ting Jiang,et al. Physical-layer security in Internet of Things based on compressed sensing and frequency selection , 2017, IET Commun..
[140] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[141] Gerd Ascheid,et al. How Effective is the Artificial Noise? Real-Time Analysis of a PHY Security Scenario , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).
[142] Leszek Szczecinski,et al. Secrecy & Rate Adaptation for secure HARQ protocols , 2013, 2013 IEEE Information Theory Workshop (ITW).
[143] Feng Xia,et al. Social-Oriented Adaptive Transmission in Opportunistic Internet of Smartphones , 2017, IEEE Transactions on Industrial Informatics.
[144] Robert W. Heath,et al. Antenna Subset Modulation for secure millimeter-wave wireless communication , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[145] Amirhossein Alimohammad,et al. Design and Implementation of a Digital Secure Code-Shifted Reference UWB Transmitter and Receiver , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.
[146] Honggang Wang,et al. A key agreement method for wireless body area networks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[147] Khairi Ashour Hamdi,et al. Silent Antenna Hopping Transmission Technique for Secure Millimeter-Wave Wireless Communication , 2014, GLOBECOM 2014.
[148] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[149] Mohamed-Slim Alouini,et al. On the Secrecy Capacity of MISO Visible Light Communication Channels , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[150] Lutz H.-J. Lampe,et al. Pattern synthesis of massive LED arrays for secure visible light communication links , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[151] Qingqing Wu,et al. Securing UAV Communications via Trajectory Optimization , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[152] Andrea M. Tonello,et al. Physical layer security in power line communication networks: an emerging scenario, other than wireless , 2014, IET Commun..
[153] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[154] Dongfeng Yuan,et al. Joint Beamforming and Time Switching Design for Secrecy Rate Maximization in Wireless-Powered FD Relay Systems , 2018, IEEE Transactions on Vehicular Technology.
[155] Zhiguo Ding,et al. Cooperative non-orthogonal relaying for security enhancement in untrusted relay networks , 2017, 2017 IEEE International Conference on Communications (ICC).
[156] Seyed Mohammad Sajad Sadough,et al. On Secure Free-Space Optical Communications Over Málaga Turbulence Channels , 2017, IEEE Wireless Communications Letters.
[157] Hüseyin Arslan,et al. Enhancing physical-layer security in wireless communications using signal space diversity , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[158] Feng Xia,et al. Vehicular Social Networks: Enabling Smart Mobility , 2017, IEEE Communications Magazine.
[159] Bing Chen,et al. Full Spectrum Sharing in Cognitive Radio Networks Toward 5G: A Survey , 2018, IEEE Access.
[160] Tareq Y. Al-Naffouri,et al. Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems , 2016, IEEE Transactions on Vehicular Technology.
[161] Pierre Duhamel,et al. Rate Adaptation for Incremental Redundancy Secure HARQ , 2016, IEEE Transactions on Communications.
[162] Wei Xu,et al. Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[163] Marco Baldi,et al. Physical and Data-Link Security Techniques for Future Communication Systems , 2016 .
[164] A. Lee Swindlehurst,et al. Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.
[165] Qi Zhang,et al. Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.
[166] A. Lee Swindlehurst,et al. Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.
[167] Yi Hong,et al. Artificial Noise Revisited , 2014, IEEE Transactions on Information Theory.
[168] Dieter Hogrefe,et al. Towards robust key extraction from multipath wireless channels , 2012, Journal of Communications and Networks.
[169] Zhen Yang,et al. Secure transmission over the wiretap channel using polar codes and artificial noise , 2017, IET Commun..
[170] Lutz H.-J. Lampe,et al. Physical-layer security for indoor visible light communications , 2014, 2014 IEEE International Conference on Communications (ICC).
[171] Taewon Hwang,et al. Energy-Efficient Link Adaptation for Secure D2D Underlaid Cellular Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[172] Zhiguo Ding,et al. Spatio-Temporal Artificial Noise Design for Secure MISOSE-OFDM Systems , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[173] Hüseyin Arslan,et al. A survey: Spoofing attacks in physical layer security , 2015, 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops).
[174] Yang Wang,et al. Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.
[175] Gregory Epiphaniou,et al. Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks , 2018, IEEE Internet of Things Journal.
[176] Haji M. Furqan,et al. Enhancing physical layer security of OFDM systems using channel shortening , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[177] Ivan B. Djordjevic,et al. Physical-Layer Security in Orbital Angular Momentum Multiplexing Free-Space Optical Communications , 2016, IEEE Photonics Journal.
[178] Yong-Hwa Kim,et al. The optimal power allocation for security in multicarrier relay power line communication , 2016, 2016 International Symposium on Power Line Communications and its Applications (ISPLC).
[179] Victor C. M. Leung,et al. Interference Alignment and Its Applications: A Survey, Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.
[180] Jehad M. Hamamreh,et al. OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.
[181] Ivan Martinovic,et al. Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis , 2010, ArXiv.
[182] Dennis Goeckel,et al. Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming , 2017, IEEE Transactions on Communications.
[183] Adeel Razi,et al. Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.
[184] Imre Csiszár,et al. Secrecy generation for multiple input multiple output channel models , 2009, 2009 IEEE International Symposium on Information Theory.
[185] Caijun Zhong,et al. Exploiting Inter-User Interference for Secure Massive Non-Orthogonal Multiple Access , 2018, IEEE Journal on Selected Areas in Communications.
[186] Walid Saad,et al. On the Physical Layer Security of Backscatter Wireless Systems , 2014, IEEE Transactions on Wireless Communications.
[187] Dimitris A. Pados,et al. Hybrid-ARQ as a communications security measure , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[188] Jinhong Yuan,et al. Optimization of Code Rates in SISOME Wiretap Channels , 2015, IEEE Transactions on Wireless Communications.
[189] Chen-Mou Cheng,et al. Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices , 2013, IEEE Journal on Selected Areas in Communications.
[190] Jehad M. Hamamreh,et al. Time-frequency characteristics and PAPR reduction of OTDM waveform for 5G and beyond , 2017, 2017 10th International Conference on Electrical and Electronics Engineering (ELECO).
[191] Ming Li,et al. Waveform Design for Secure SISO Transmissions and Multicasting , 2013, IEEE Journal on Selected Areas in Communications.
[192] Li Sun,et al. Secure transmission through multihop relaying in wireless body area networks , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).
[193] Quanzhong Li,et al. Secure Beamforming in Downlink MIMO Nonorthogonal Multiple Access Networks , 2017, IEEE Signal Processing Letters.
[194] I. Motivation,et al. Secret-Key Agreement Over Unauthenticated Public Channels—Part III: Privacy Amplification , 2003 .
[195] Xiang Cheng,et al. Index Modulation for 5G Wireless Communications , 2016 .
[196] Tolga M. Duman,et al. Physical Layer Security for Space Shift Keying Transmission With Precoding , 2016, IEEE Wireless Communications Letters.
[197] Mohammad Abdullah Al Faruque,et al. Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[198] Haji M. Furqan,et al. Cognitive Security of Wireless Communication Systems in the Physical Layer , 2017, Wirel. Commun. Mob. Comput..
[199] Li Sun,et al. Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation , 2016, IEEE Transactions on Vehicular Technology.
[200] Aydin Sezgin,et al. Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.
[201] Mustafa Cenk Gursoy,et al. Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.
[202] F. Javier Lopez-Martinez,et al. Physical-Layer Security in Free-Space Optical Communications , 2015, IEEE Photonics Journal.
[203] Can Emre Koksal,et al. How Vulnerable Is Vehicular Communication to Physical Layer Jamming Attacks? , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).
[204] Dennis Goeckel,et al. Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments , 2014, IEEE Transactions on Wireless Communications.
[205] Lie-Liang Yang,et al. Secure Spatial Modulation With a Full-Duplex Receiver , 2017, IEEE Wireless Communications Letters.
[206] Qinye Yin,et al. Secure transmission with artificial noise in millimeter wave systems , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[207] Bingli Jiao,et al. Artificial-noise strategy for single-antenna systems over multi-path fading channels , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
[208] Haji M. Furqan,et al. Secure pre-coding and post-coding for OFDM systems along with hardware implementation , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[209] Hong Wen,et al. The realization of key extraction based on USRP and OFDM channel response , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[210] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[211] Takahiko Saba,et al. Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in MIMO-OFDM systems , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[212] Xiaohua Li,et al. Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions , 2007, J. Commun..
[213] Nitesh Saxena,et al. Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing , 2013, IEEE Transactions on Information Forensics and Security.
[214] Mohamed-Slim Alouini,et al. On the Secrecy Capacity of the Wiretap Channel With Imperfect Main Channel Estimation , 2014, IEEE Transactions on Communications.
[215] Tolga M. Duman,et al. Randomized Serially Concatenated LDGM Codes for the Gaussian Wiretap Channel , 2018, IEEE Communications Letters.
[216] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[217] Wenliang Du,et al. Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.
[218] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[219] Omid Abbasi,et al. Secrecy analysis of a NOMA system with Full Duplex and Half Duplex Relay , 2017, 2017 Iran Workshop on Communication and Information Theory (IWCIT).
[220] Kevin Fu,et al. They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.
[221] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[222] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[223] David Tse,et al. Opportunistic beamforming using dumb antennas , 2002, IEEE Trans. Inf. Theory.
[224] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[225] Wei-Ping Zhu,et al. Improving secrecy performance via device-to-device jamming in cellular networks , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).
[226] Yuan Ding,et al. Retrodirective-Assisted Secure Wireless Key Establishment , 2017, IEEE Transactions on Communications.
[227] João M. F. Xavier,et al. Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel , 2013, IEEE Transactions on Signal Processing.
[228] Lingyang Song,et al. Physical Layer Security in Wireless Communications , 2013 .
[229] Reihaneh Safavi-Naini,et al. Secret key agreement using a virtual wiretap channel , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[230] Erica L. Daly,et al. Demonstration of Directional Modulation Using a Phased Array , 2010, IEEE Transactions on Antennas and Propagation.
[231] Dac-Binh Ha,et al. Physical layer security in UWB communication systems with transmit antenna selection , 2014, 2014 International Conference on Computing, Management and Telecommunications (ComManTel).
[232] Mehmet A. Orgun,et al. Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review , 2017, IEEE Sensors Journal.
[233] Aiqing Zhang,et al. Security-Aware and Privacy-Preserving D2D Communications in 5G , 2017, IEEE Network.
[234] Li Sun,et al. Statistical security model and power adaptation over wireless fading channels , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[235] Jinho Choi,et al. Secure Index and Data Symbol Modulation for OFDM-IM , 2017, IEEE Access.
[236] Amitav Mukherjee,et al. Deploying multi-antenna energy-harvesting cooperative jammers in the MIMO wiretap channel , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[237] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[238] Dina Katabi,et al. Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.
[239] Khaled M. Rabie,et al. Physical layer security of cooperative relaying power-line communication systems , 2016, 2016 International Symposium on Power Line Communications and its Applications (ISPLC).
[240] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[241] Francis Minhthang Bui,et al. Delay-Aware Optimization of Physical Layer Security in Multi-Hop Wireless Body Area Networks , 2016, IEEE Transactions on Information Forensics and Security.
[242] Balasubramaniam Natarajan,et al. Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks , 2015, IEEE Transactions on Information Forensics and Security.
[243] Xiang Cheng,et al. Joint power and access control for physical layer security in D2D communications underlaying cellular networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[244] Hang Li,et al. Optimal and Robust Secure Beamformer for Indoor MISO Visible Light Communication , 2016, Journal of Lightwave Technology.
[245] Zhu Han,et al. Transmit optimization for secure MIMO RFID wireless communication , 2016, 2016 IEEE International Conference on Communications (ICC).
[246] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[247] Liang Yin,et al. Physical-Layer Security in Multiuser Visible Light Communication Networks , 2018, IEEE Journal on Selected Areas in Communications.
[248] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[249] Wan Choi,et al. Joint Power and Rate Control for Device-to-Device Communications in Cellular Systems , 2015, IEEE Transactions on Wireless Communications.
[250] Raksha Upadhyay,et al. Internet of Things and Wireless Physical Layer Security: A Survey , 2017 .
[251] Hisato Iwai,et al. Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.
[252] Athanasios V. Vasilakos,et al. Channel Information based Cryptography and Authentication in Wireless Body Area Networks , 2013, BODYNETS.
[253] Limin Xiao,et al. Power-efficient joint resource allocation for multiuser wiretap OFDM channels , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[254] Gang Su,et al. Transmit Antenna Selection for the Distributed MIMO Systems , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[255] Xuelong Li,et al. Secrecy-Optimized Resource Allocation for Device-to-Device Communication Underlaying Heterogeneous Networks , 2017, IEEE Transactions on Vehicular Technology.
[256] Hüseyin Arslan,et al. A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.
[257] Xianbin Wang,et al. Eavesdropping-Resilient OFDM System Using Sorted Subcarrier Interleaving , 2015, IEEE Transactions on Wireless Communications.
[258] Hüseyin Arslan,et al. Randomized Beamforming With Generalized Selection Transmission for Security Enhancement in MISO Wiretap Channels , 2018, IEEE Access.
[259] Emad Alsusa,et al. Secret Key Exchange and Authentication via Randomized Spatial Modulation and Phase Shifting , 2018, IEEE Transactions on Vehicular Technology.
[260] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[261] Xin Wang,et al. Physical layer security in wireless smart grid , 2015, Secur. Commun. Networks.
[262] Nicola Laurenti,et al. Resource allocation for secret transmissions on parallel Rayleigh channels , 2014, 2014 IEEE International Conference on Communications (ICC).
[263] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.
[264] Victor C. M. Leung,et al. Optimization or Alignment: Secure Primary Transmission Assisted by Secondary Networks , 2018, IEEE Journal on Selected Areas in Communications.
[265] Yahya Al-Harthi,et al. Secret Key Generation Protocol for Optical OFDM Systems in Indoor VLC Networks , 2017, IEEE Photonics Journal.
[266] Amitav Mukherjee. Secret-Key Agreement for Security in Multi-Emitter Visible Light Communication Systems , 2016, IEEE Communications Letters.
[267] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[268] Anh T. Pham,et al. On the secrecy sum-rate of MU-VLC broadcast systems with confidential messages , 2016, 2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP).
[269] Michael A. Jensen,et al. Secrecy Extraction from Increased Randomness in a Time-Variant MIMO Channel , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[270] Hüseyin Arslan,et al. N-continuous OFDM with CP alignment , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[271] Hisato Iwai,et al. Reliability-Based Sliced Error Correction in Secret Key Agreement from Fading Channel , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[272] Pinyi Ren,et al. Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.
[273] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[274] Li Sun,et al. Cooperative jamming with untrusted SUs for secure communication of two-hop primary system , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
[275] Huiming Wang,et al. Physical Layer Security in Millimeter Wave Cellular Networks , 2016, IEEE Transactions on Wireless Communications.
[276] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[277] Tao Hong,et al. Peak-to-Average Power Ratio Reduction for an Artificial Noise Aided Secure Communication System , 2016, 2016 3rd International Conference on Information Science and Control Engineering (ICISCE).
[278] H. Vincent Poor,et al. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[279] Aydin Babakhani,et al. A Near-Field Modulation Technique Using Antenna Reflector Switching , 2008, 2008 IEEE International Solid-State Circuits Conference - Digest of Technical Papers.
[280] Lei Wang,et al. Offloading in Internet of Vehicles: A Fog-Enabled Real-Time Traffic Management System , 2018, IEEE Transactions on Industrial Informatics.
[281] Ami Wiesel,et al. On the Gaussian MIMO Wiretap Channel , 2007, 2007 IEEE International Symposium on Information Theory.
[282] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[283] Zhiguo Ding,et al. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.
[284] MengChu Zhou,et al. A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles , 2018, IEEE Internet of Things Journal.
[285] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[286] Sanjay Jha,et al. Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints , 2014, IEEE Transactions on Information Forensics and Security.
[287] Yingbo Hua,et al. Fundamental Properties of Full-Duplex Radio for Secure Wireless Communications , 2017, ArXiv.
[288] Marco Chiani,et al. Secret key extraction from a UWB channel: Analysis in a real environment , 2014, 2014 IEEE International Conference on Ultra-WideBand (ICUWB).
[289] Yongming Huang,et al. Robust Secure Beamforming for 5G Cellular Networks Coexisting With Satellite Networks , 2018, IEEE Journal on Selected Areas in Communications.
[290] Hung Viet Nguyen,et al. A Survey on Quantum Channel Capacities , 2018, IEEE Communications Surveys & Tutorials.
[291] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[292] Nader Mokari,et al. Secure resource allocation in OFDMA-based cognitive radio networks with two-way relays , 2015, 2015 23rd Iranian Conference on Electrical Engineering.
[293] Li Sun,et al. Security protection over wireless fading channels by exploiting frequency selectivity , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).
[294] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels III: Privacy amplification , 2003, IEEE Trans. Inf. Theory.
[295] Lin Zhang,et al. High Security Differential Chaos-Based Modulation With Channel Scrambling for WDM-Aided VLC System , 2016, IEEE Photonics Journal.
[296] Xiangyun Zhou,et al. On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels , 2016, IEEE Transactions on Wireless Communications.
[297] Qinghe Du,et al. Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission , 2017, 2017 IEEE International Conference on Communications (ICC).
[298] Qian Xu,et al. Experimental Study on Key Generation for Physical Layer Security in Wireless Communications , 2016, IEEE Access.
[299] Marco Di Renzo,et al. On secrecy rate analysis of spatial modulation and space shift keying , 2015, 2015 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom).
[300] Xiang Cheng,et al. An iterative FFT-based antenna subset modulation for secure millimeter wave communications , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).
[301] Lutz H.-J. Lampe,et al. Securing visible light communications via friendly jamming , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[302] Chong-Yung Chi,et al. Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.
[303] Lenan Wu,et al. Exploiting the Randomness Inherent of the Channel for Secret Key Sharing in Vehicular Communications , 2018, Int. J. Intell. Transp. Syst. Res..
[304] Daniel Smith-Tone,et al. Report on Post-Quantum Cryptography , 2016 .
[305] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[306] Zhiguo Ding,et al. Non-Orthogonal Multiple Access (NOMA) for 5G Systems , 2017 .
[307] Xiaoshuang Xing,et al. Optimal Stopping Theory Based Jammer Selection for Securing Cooperative Cognitive Radio Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[308] Liang Jin,et al. A channel matched design of LDPC based secrecy coding for the fast fading channel , 2014, 2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS).
[309] Harald Haas,et al. Index Modulation Techniques for Next-Generation Wireless Networks , 2017, IEEE Access.
[310] Mounir Ghogho,et al. Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.
[311] Wei Xu,et al. Secrecy-Oriented Transmitter Optimization for Visible Light Communication Systems , 2016, IEEE Photonics Journal.
[312] Allan O. Steinhardt,et al. Beamforming for Simultaneous Energy and Information Transfer and Physical-Layer Secrecy , 2017, IEEE Transactions on Wireless Communications.
[313] Aylin Yener,et al. Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[314] Farshad Lahouti,et al. Link adaptation for physical layer security over wireless fading channels , 2012, IET Commun..
[315] Tolga M. Duman,et al. Secure Space Shift Keying Transmission Using Dynamic Antenna Index Assignment , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[316] Zhu Han,et al. Physical Layer Security in MIMO Backscatter Wireless Systems , 2016, IEEE Transactions on Wireless Communications.
[317] Michael A. Jensen,et al. Random number generation from multipath propagation: MIMO-based encryption key establishment , 2009, 2009 IEEE Antennas and Propagation Society International Symposium.
[318] Matthieu R. Bloch,et al. Strong Secrecy From Channel Resolvability , 2011, IEEE Transactions on Information Theory.
[319] Aijun Liu,et al. Polar-LDPC Concatenated Coding for the AWGN Wiretap Channel , 2014, IEEE Communications Letters.
[320] A Subramanian,et al. Strong and weak secrecy in wiretap channels , 2010, 2010 6th International Symposium on Turbo Codes & Iterative Information Processing.
[321] Lorenzo Mucchi,et al. Physical layer security for IoT devices configuration and key management - a Proof of Concept , 2016, 2016 AEIT International Annual Conference (AEIT).
[322] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[323] Xiang Cheng,et al. Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).
[324] Lutz H.-J. Lampe,et al. Optimal and Robust Beamforming for Secure Transmission in MISO Visible-Light Communication Links , 2016, IEEE Transactions on Signal Processing.
[325] Li Sun,et al. Cooperative Relaying and Jamming for Primary Secure Communication in Cognitive Two-Way Networks , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).
[326] Stark C. Draper,et al. Secret key generation through OFDM multipath channel , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[327] Dieter Hogrefe,et al. Intelligent mechanisms for key generation from multipath wireless channels , 2011, 2011 Wireless Telecommunications Symposium (WTS).
[328] Yiyang Pei,et al. Achieving cognitive and secure transmissions using multiple antennas , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.
[329] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[330] Hüseyin Arslan,et al. Suppressing Alignment: Joint PAPR and Out-of-Band Power Leakage Reduction for OFDM-Based Systems , 2014, IEEE Transactions on Communications.
[331] Guihai Chen,et al. Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios , 2017, IEEE Transactions on Mobile Computing.
[332] Hüseyin Arslan,et al. Controlled Inter-Carrier Interference for Physical Layer Security in OFDM Systems , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).
[333] Hyuckjae Lee,et al. Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR , 2011, IEEE Transactions on Information Theory.
[334] Jiaheng Wang,et al. Performance of Secure Communications Over Correlated Fading Channels , 2012, IEEE Signal Processing Letters.
[335] Abbas Taherpour,et al. Optimization of secrecy rate in cooperative device to device communications , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).
[336] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[337] Junqing Zhang,et al. Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[338] Robert W. Heath,et al. Secure Communications in Millimeter Wave Ad Hoc Networks , 2016, IEEE Transactions on Wireless Communications.
[339] Lan Wang,et al. Securing wireless implantable devices for healthcare: Ideas and challenges , 2009, IEEE Communications Magazine.
[340] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[341] Marco Baldi,et al. Security gap performance of some LDPC code constructions , 2013, 2013 36th International Conference on Telecommunications and Signal Processing (TSP).
[342] Lav Gupta,et al. Survey of Important Issues in UAV Communication Networks , 2016, IEEE Communications Surveys & Tutorials.
[343] Zabih Ghassemlooy,et al. Secured communications-zone multiple input multiple output visible light communications , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[344] Jehad M. Hamamreh,et al. On physical-layer concepts and metrics in secure signal transmission , 2017, Phys. Commun..
[345] Qi Zhang,et al. Secrecy Sum Rate Optimization for Downlink MIMO Nonorthogonal Multiple Access Systems , 2017, IEEE Signal Processing Letters.
[346] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result , 2003, IEEE Trans. Inf. Theory.
[347] Jehad M. Hamamreh,et al. Secure Orthogonal Transform Division Multiplexing (OTDM) Waveform for 5G and Beyond , 2017, IEEE Communications Letters.
[348] Zhiguo Ding,et al. Hybrid Spatio-Temporal Artificial Noise Design for Secure MIMOME-OFDM Systems , 2017, IEEE Transactions on Vehicular Technology.
[349] Evsen Yanmaz,et al. Survey on Unmanned Aerial Vehicle Networks for Civil Applications: A Communications Viewpoint , 2016, IEEE Communications Surveys & Tutorials.
[350] Tadayoshi Kohno,et al. Securing RFIDs by Randomizing the Modulation and Channel , 2015, NSDI.
[351] Nicola Laurenti,et al. Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis , 2014, IEEE Transactions on Information Forensics and Security.
[352] Harald Haas,et al. Secrecy Capacity of Space Keying with Two Antennas , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).
[353] Moustafa Youssef,et al. Keys Through ARQ: Theory and Practice , 2011, IEEE Transactions on Information Forensics and Security.
[354] Remi A. Chou,et al. Polar coding for the broadcast channel with confidential messages , 2015, ITW.
[355] Wen-Qin Wang,et al. Hybrid MIMO and Phased-Array Directional Modulation for Physical Layer Security in mmWave Wireless Communications , 2018, IEEE Journal on Selected Areas in Communications.
[356] Roy D. Yates,et al. Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[357] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[358] Il-Min Kim,et al. BER-Based Physical Layer Security With Finite Codelength: Combining Strong Converse and Error Amplification , 2014, IEEE Transactions on Communications.
[359] Jehad M. Hamamreh,et al. A practical physical-layer security method for precoded OSTBC-based systems , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[360] Danda B. Rawat,et al. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[361] Yueming Cai,et al. Joint Traffic Scheduling and Resource Allocations for Traffic Offloading With Secrecy Provisioning , 2017, IEEE Transactions on Vehicular Technology.
[362] Naofal Al-Dhahir,et al. Secure Space-Time Block Coding without Transmitter CSI , 2014, IEEE Wireless Communications Letters.
[363] Lie-Liang Yang,et al. Transmitter Precoding-Aided Spatial Modulation for Secrecy Communications , 2016, IEEE Transactions on Vehicular Technology.
[364] H. Vincent Poor,et al. Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.
[365] Zhi Chen,et al. Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.
[366] Walid Saad,et al. On the physical layer security of backscatter RFID systems , 2012, 2012 International Symposium on Wireless Communication Systems (ISWCS).
[367] Tran Trung Duy,et al. Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.
[368] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[369] Dennis Goeckel,et al. Secrecy Rate Pair Constraints for Secure Throughput , 2014, 2014 IEEE Military Communications Conference.
[370] Pierre Duhamel,et al. Rate-adaptive secure HARQ protocol for block-fading channels , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).
[371] Lei Guo,et al. A New Eavesdropping-Resilient Framework for Indoor Visible Light Communication , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[372] H. Sasaoka,et al. A Scheme of Secret Key Agreement Based on Received Signal Strength Variation by Antenna Switching in Land Mobile Radio , 2007, The 9th International Conference on Advanced Communication Technology.
[373] Matti Hämäläinen,et al. An Ultra Wideband Survey: Global Regulations and Impulse Radio Research Based on Standards , 2017, IEEE Communications Surveys & Tutorials.
[374] Jehad M. Hamamreh,et al. Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[375] Caijun Zhong,et al. Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.
[376] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[377] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[378] Theodore S. Rappaport,et al. Millimeter Wave Wireless Communications , 2014 .
[379] Mohamed-Slim Alouini,et al. On the input distribution and optimal beamforming for the MISO VLC wiretap channel , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[380] Jonathan Rodriguez,et al. A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation , 2017, IEEE Transactions on Vehicular Technology.
[381] Ling Liu,et al. Achieving Secrecy Capacity of the Gaussian Wiretap Channel With Polar Lattices , 2015, IEEE Transactions on Information Theory.
[382] Michael A. Jensen,et al. Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits , 2009, 2009 3rd European Conference on Antennas and Propagation.
[383] Xianbin Wang,et al. Eavesdropping-Resilient OFDM System Using CSI-Based Dynamic Subcarrier Allocation , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).
[384] Heng Zhou,et al. Secret Key Generation in the Two-Way Relay Channel With Active Attackers , 2014, IEEE Transactions on Information Forensics and Security.
[385] Hsiao-Hwa Chen,et al. A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.
[386] Ami Wiesel,et al. Zero-Forcing Precoding and Generalized Inverses , 2008, IEEE Transactions on Signal Processing.
[387] Alexander Vardy,et al. A new polar coding scheme for strong security on wiretap channels , 2013, 2013 IEEE International Symposium on Information Theory.
[388] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[389] Jehad M. Hamamreh,et al. Joint PHY/MAC Layer Security Design Using ARQ With MRC and Null-Space Independent PAPR-Aware Artificial Noise in SISO Systems , 2018, IEEE Transactions on Wireless Communications.
[390] Huiming Wang,et al. Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.
[391] Zhi Chen,et al. Sum secrecy rate optimization for MIMOME wiretap channel with artificial noise and D2D underlay communication , 2017, 2017 IEEE International Conference on Communications (ICC).
[392] Huiming Wang,et al. Secrecy throughput maximization for millimeter wave systems with artificial noise , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[393] Shiwen Mao,et al. Wireless Multimedia Cognitive Radio Networks: A Comprehensive Survey , 2018, IEEE Communications Surveys & Tutorials.
[394] A. Lee Swindlehurst,et al. Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.
[395] Robert W. Heath,et al. Secure communication in cellular networks: The benefits of millimeter wave mobile broadband , 2014, 2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[396] Panlong Yang,et al. SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference , 2013, IEEE Transactions on Information Forensics and Security.
[397] Stephen W. Neville,et al. Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).
[398] Zouheir Rezki,et al. Optical Wiretap Channel With Input-Dependent Gaussian Noise Under Peak- and Average-Intensity Constraints , 2018, IEEE Transactions on Information Theory.
[399] Lutz Lampe,et al. Physical layer security in MIMO power line communication networks , 2014, 18th IEEE International Symposium on Power Line Communications and Its Applications.
[400] Dennis Goeckel,et al. Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver , 2012, IEEE Journal on Selected Areas in Communications.
[401] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[402] Xia Wang,et al. Spatial modulation aided physical layer security enhancement for fading wiretap channels , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).
[403] Aylin Yener,et al. Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.
[404] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[405] Vincent K. N. Lau,et al. Artificial Noise Injection for Securing Single-Antenna Systems , 2017, IEEE Transactions on Vehicular Technology.
[406] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[407] Bingli Jiao,et al. An Absolute Secure Wire-Line Communication Method Against Wiretapper , 2017, IEEE Communications Letters.
[408] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[409] Naofal Al-Dhahir,et al. Impact of the Wireless Network’s PHY Security and Reliability on Demand-Side Management Cost in the Smart Grid , 2017, IEEE Access.
[410] Kostas Berberidis,et al. Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink , 2015, IEEE Transactions on Information Forensics and Security.
[411] Huifang Chen,et al. A feedback-based secrecy coding scheme using polar code over wiretap channels , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).
[412] Xuelong Li,et al. Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.
[413] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[414] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.
[415] S. El-Rabaie,et al. Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[416] 李桥龙. Achieving Secure Transmission with Equivalent Multiplicative Noise in MISO Wiretap Channels , 2013 .
[417] Hongbin Chen,et al. On Physical-Layer Security in Multiuser Visible Light Communication Systems With Non-Orthogonal Multiple Access , 2018, IEEE Access.