Flexible Physical Layer Security for Joint Data and Pilots in Future Wireless Networks
暂无分享,去创建一个
[1] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[2] Nuwan S. Ferdinand,et al. Physical Layer Secrecy Performance of TAS Wiretap Channels with Correlated Main and Eavesdropper Channels , 2014, IEEE Wireless Communications Letters.
[3] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[4] Dieter Hogrefe,et al. A survey on secret key generation mechanisms on the physical layer in wireless networks , 2015, Secur. Commun. Networks.
[5] Ahmad Y. Javaid,et al. Link-Signature-Based Discriminatory Channel Estimation (LS-DCE) for Physical Layer Security in Stationary and Mobile OFDM Transceivers , 2020, IEEE Transactions on Vehicular Technology.
[6] Zhi-Quan Luo,et al. Minimum BER block precoders for zero-forcing equalization , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[7] Yao-Win Peter Hong,et al. On the Role of Artificial Noise in Training and Data Transmission for Secret Communications , 2015, IEEE Transactions on Information Forensics and Security.
[8] Kazuo Mori,et al. Channel state based secure wireless communication , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[9] Rahim Tafazolli,et al. Massive MIMO Performance With Imperfect Channel Reciprocity and Channel Estimation Error , 2017, IEEE Transactions on Communications.
[10] Chong-Yung Chi,et al. Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.
[11] Yingbo Hua,et al. Optimal Pilots for Anti-Eavesdropping Channel Estimation , 2020, IEEE Transactions on Signal Processing.
[12] 조위덕. Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.
[13] Hüseyin Arslan,et al. Achieving secure communication through pilot manipulation , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[14] Haji M. Furqan,et al. Enhancing physical layer security of OFDM systems using channel shortening , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[15] Jehad M. Hamamreh,et al. OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.
[16] Chong-Yung Chi,et al. Training Signal Design for Discriminatory Channel Estimation , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[17] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[18] Himanshu Sharma,et al. Channel Estimation in OFDM Systems , 2013 .
[19] Haji M. Furqan,et al. Wireless Communication, Sensing, and REM: A Security Perspective , 2021, IEEE Open Journal of the Communications Society.
[20] A. W. M. van den Enden,et al. Discrete Time Signal Processing , 1989 .
[21] Hüseyin Arslan,et al. Secure communication in frequency selective channels with fade-avoiding subchannel usage , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[22] Cheng Li,et al. Improving Secrecy under High Correlation via Discriminatory Channel Estimation , 2018, 2018 IEEE International Conference on Communications (ICC).
[23] Haji M. Furqan,et al. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[24] Yu Ted Su,et al. Performance analysis of equalized OFDM systems in Rayleigh fading , 2002, IEEE Trans. Wirel. Commun..
[25] Edward W. Knightly,et al. $CSIsnoop$ : Inferring Channel State Information in Multi-User MIMO WLANs , 2019, IEEE/ACM Transactions on Networking.
[26] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[27] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[28] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[29] Qian Xu,et al. Experimental Study on Key Generation for Physical Layer Security in Wireless Communications , 2016, IEEE Access.
[30] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.