Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[3] Martin E. Hellman,et al. A note on Wyner's wiretap channel (Corresp.) , 1977, IEEE Trans. Inf. Theory.
[4] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[5] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[6] Abbas El Gamal,et al. Capacity theorems for the relay channel , 1979, IEEE Trans. Inf. Theory.
[7] Hirosuke Yamamoto. Coding theorem for secret sharing communication systems with two noisy channels , 1989, IEEE Trans. Inf. Theory.
[8] Hirosuke Yamamoto,et al. A coding theorem for secret sharing communication systems with two Gaussian wiretap channels , 1991, IEEE Trans. Inf. Theory.
[9] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[10] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[11] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[12] Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[13] Marten van Dijk. On a special class of broadcast channels with confidential messages , 1997, IEEE Trans. Inf. Theory.
[14] Pravin Varaiya,et al. Capacity of fading channels with channel side information , 1997, IEEE Trans. Inf. Theory.
[15] Umberto Mengali,et al. A comparison of pilot-aided channel estimation methods for OFDM systems , 2001, IEEE Trans. Signal Process..
[16] Yasutada Oohama,et al. Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).
[17] Alfred O. Hero,et al. Secure space-time communication , 2003, IEEE Trans. Inf. Theory.
[18] David Gesbert,et al. From theory to practice: an overview of MIMO space-time coded wireless systems , 2003, IEEE J. Sel. Areas Commun..
[19] Desmond C. McLernon,et al. Channel estimation using implicit training , 2004, IEEE Transactions on Signal Processing.
[20] Haralabos C. Papadopoulos,et al. Physical-layer secrecy in AWGN via a class of chaotic DS/SS systems: analysis and design , 2004, IEEE Transactions on Signal Processing.
[21] Xianbin Wang,et al. Transmitter identification using embedded pseudo random sequences , 2004, IEEE Transactions on Broadcasting.
[22] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[23] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[24] Jian Ren,et al. Physical layer built-in security analysis and enhancement of CDMA systems , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[25] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[26] Gregory W. Wornell,et al. Authentication with distortion criteria , 2005, IEEE Transactions on Information Theory.
[27] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[28] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[29] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[30] C.-C. Jay Kuo,et al. Cooperative Communications in Resource-Constrained Wireless Networks , 2007, IEEE Signal Processing Magazine.
[31] Roy D. Yates,et al. Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[32] Yasutada Oohama,et al. Capacity Theorems for Relay Channels with Confidential Messages , 2007, 2007 IEEE International Symposium on Information Theory.
[33] Guanding Yu,et al. On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.
[34] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[35] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[36] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[37] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[38] Ami Wiesel,et al. On the Gaussian MIMO Wiretap Channel , 2007, 2007 IEEE International Symposium on Information Theory.
[39] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[40] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[41] Vinod M. Prabhakaran,et al. The secrecy capacity of a class of parallel Gaussian compound wiretap channels , 2008, 2008 IEEE International Symposium on Information Theory.
[42] Ami Wiesel,et al. Zero-Forcing Precoding and Generalized Inverses , 2008, IEEE Transactions on Signal Processing.
[43] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[44] Leonid Reyzin,et al. Key Agreement from Close Secrets over Unsecured Channels , 2009, IACR Cryptol. ePrint Arch..
[45] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[46] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[47] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[48] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[49] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[50] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[51] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[52] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[53] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[54] Nan Liu,et al. Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.
[55] H. Vincent Poor,et al. Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.
[56] David J. Edwards,et al. Near-optimal joint antenna selection for amplify-and-forward relay networks , 2009 .
[57] John S. Baras,et al. Power allocation tradeoffs in multicarrier authentication systems , 2009, 2009 IEEE Sarnoff Symposium.
[58] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[59] Mathini Sellathurai,et al. Secrecy capacity of Nakagami-m fading wireless channels in the presence of multiple eavesdroppers , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.
[60] Shlomo Shamai,et al. Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..
[61] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[62] A. Lee Swindlehurst,et al. Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[63] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[64] Larry J. Greenstein,et al. Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.
[65] K. J. Ray Liu,et al. Authenticating MIMO Transmissions Using Channel-Like Fingerprinting , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[66] Branka Vucetic,et al. Practical physical layer network coding for two-way relay channels: performance analysis and comparison , 2010, IEEE Transactions on Wireless Communications.
[67] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[68] Naga Bhushan,et al. LTE-Advanced: Heterogeneous networks , 2010, 2010 European Wireless Conference (EW).
[69] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[70] Shlomo Shamai,et al. Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[71] T. Charles Clancy,et al. Physical Layer Authentication Watermarks through Synthetic Channel Emulation , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[72] Shuguang Cui,et al. On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[73] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[74] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[75] Larry J. Greenstein,et al. PHY-Authentication Protocol for Spoofing Detection in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[76] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[77] Alexander Vardy,et al. Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.
[78] Miguel R. D. Rodrigues,et al. On Wireless Channels with M-Antenna Eavesdroppers: Characterization of the Outage Probability and Outage Secrecy Capacity , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[79] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[80] Hyuckjae Lee,et al. Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR , 2011, IEEE Transactions on Information Theory.
[81] A. Lee Swindlehurst,et al. A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[82] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.
[83] Xianbin Wang,et al. Robust physical layer authentication using inherent properties of channel impulse response , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[84] Eylem Ekici,et al. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.
[85] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[86] Miguel R. D. Rodrigues,et al. On Wireless Channels With ${M}$-Antenna Eavesdroppers: Characterization of the Outage Probability and $\varepsilon $-Outage Secrecy Capacity , 2011, IEEE Transactions on Information Forensics and Security.
[87] K. J. Ray Liu,et al. Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO Systems , 2011, IEEE Transactions on Wireless Communications.
[88] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[89] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[90] Hisato Iwai,et al. Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.
[91] A. Lee Swindlehurst,et al. Dirty Paper Coding versus Linear GSVD-Based Precoding in MIMO Broadcast Channel with Confidential Messages , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[92] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[93] Sennur Ulukus,et al. Secrecy in Cooperative Relay Broadcast Channels , 2011, IEEE Trans. Inf. Theory.
[94] A. Lee Swindlehurst,et al. MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design , 2011, IEEE Transactions on Information Forensics and Security.
[95] Qiang Li,et al. Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.
[96] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[97] Chong-Yung Chi,et al. On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2011, IEEE Trans. Wirel. Commun..
[98] Derrick Wing Kwan Ng,et al. Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.
[99] Luc Vandendorpe,et al. Secure Communication Over Parallel Relay Channel , 2010, IEEE Transactions on Information Forensics and Security.
[100] Michael A. Temple,et al. Intrinsic Physical-Layer Authentication of Integrated Circuits , 2012, IEEE Transactions on Information Forensics and Security.
[101] Marco Baldi,et al. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[102] Athina P. Petropulu,et al. Physical layer security with uncoordinated helpers implementing cooperative jamming , 2012, 2012 IEEE 7th Sensor Array and Multichannel Signal Processing Workshop (SAM).
[103] Antonia Maria Tulino,et al. Physical layer security in space-division multiplexed fiber optic communications , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[104] Sennur Ulukus,et al. Degraded Compound Multi-Receiver Wiretap Channels , 2009, IEEE Transactions on Information Theory.
[105] Holger Boche,et al. Physical Layer Integration of Private, Common, and Confidential Messages in Bidirectional Relay Networks , 2012, IEEE Transactions on Wireless Communications.
[106] Kai-Jie Yang,et al. A New Cooperative Transmission Strategy for Physical-Layer Security with Multiple Eavesdroppers , 2012, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring).
[107] A. Lee Swindlehurst,et al. Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.
[108] Victor C. M. Leung,et al. Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications , 2012, IEEE Transactions on Vehicular Technology.
[109] H. Vincent Poor,et al. Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.
[110] Xin Wang,et al. Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.
[111] Stark C. Draper,et al. Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.
[112] Adeel Razi,et al. Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.
[113] Jianhua Lu,et al. Improving Wireless Security for Bidirectional Communication Scenarios , 2012, IEEE Transactions on Vehicular Technology.
[114] Li Sun,et al. Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.
[115] A. Lee Swindlehurst,et al. Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[116] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[117] Tao Yang,et al. Distance Spectrum and Performance of Channel-Coded Physical-Layer Network Coding for Binary-Input Gaussian Two-Way Relay Channels , 2012 .
[118] Raef Bassily,et al. Deaf Cooperation for Secrecy With Multiple Antennas at the Helper , 2012, IEEE Transactions on Information Forensics and Security.
[119] Ness B. Shroff,et al. Secrecy outage capacity of fading channels , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).
[120] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..
[121] Sung-Ju Lee,et al. STROBE: Actively securing wireless communications using Zero-Forcing Beamforming , 2012, 2012 Proceedings IEEE INFOCOM.
[122] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[123] Xiang Cheng,et al. Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[124] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[125] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[126] John S. Baras,et al. Preventing wormhole attacks using physical layer authentication , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[127] Zhiguo Ding,et al. A General Relaying Transmission Protocol for MIMO Secrecy Communications , 2012, IEEE Transactions on Communications.
[128] Nicola Laurenti,et al. Physical Layer Authentication over MIMO Fading Wiretap Channels , 2012, IEEE Transactions on Wireless Communications.
[129] Mani Mina,et al. Physical-Layer Identification of Wired Ethernet Devices , 2012, IEEE Transactions on Information Forensics and Security.
[130] Tie Liu,et al. Security Embedding Codes , 2010, IEEE Transactions on Information Forensics and Security.
[131] Xianbin Wang,et al. A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).
[132] Yan Dong,et al. PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[133] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[134] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[135] A. Lee Swindlehurst,et al. Full Rank Solutions for the MIMO Gaussian Wiretap Channel With an Average Power Constraint , 2012, IEEE Transactions on Signal Processing.
[136] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[137] Ming Li,et al. BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2012, IEEE Journal on Selected Areas in Communications.
[138] R. Michael Buehrer,et al. Physical layer security of hybrid spread spectrum systems , 2013, 2013 IEEE Radio and Wireless Symposium.
[139] Aylin Yener,et al. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay , 2013, IEEE Transactions on Information Theory.
[140] Song Ci,et al. On physical layer security for cognitive radio networks , 2013, IEEE Network.
[141] Mikko Vehkaperä,et al. On the Optimal Precoding for MIMO Gaussian Wire-Tap Channels , 2013, ISWCS.
[142] Qiang Li,et al. Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.
[143] A. Lee Swindlehurst,et al. Wireless physical layer security enhancement with buffer-aided relaying , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.
[144] Amir K. Khandani,et al. The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel , 2009, IEEE Transactions on Information Theory.
[145] Lingyang Song,et al. Physical Layer Security in Wireless Communications , 2013 .
[146] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[147] Xianda Zhang,et al. Secure Relay Beamforming With Imperfect Channel Side Information , 2013, IEEE Transactions on Vehicular Technology.
[148] Rahim Tafazolli,et al. On the Trade-Off Between Security and Energy Efficiency in Cooperative Spectrum Sensing for Cognitive Radio , 2013, IEEE Communications Letters.
[149] Eduard A. Jorswieck,et al. Secret key generation from reciprocal spatially correlated MIMO channels , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[150] João M. F. Xavier,et al. Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel , 2013, IEEE Transactions on Signal Processing.
[151] Theodore S. Rappaport,et al. Millimeter Wave Mobile Communications for 5G Cellular: It Will Work! , 2013, IEEE Access.
[152] Raef Bassily,et al. Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks , 2013, IEEE Transactions on Signal Processing.
[153] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[154] Jitendra K. Tugnait,et al. Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.
[155] Frédérique E. Oggier,et al. A Classification of Unimodular Lattice Wiretap Codes in Small Dimensions , 2013, IEEE Transactions on Information Theory.
[156] Shih-Chun Lin,et al. On ergodic secrecy capacity of fast fading MIMOME wiretap channel with statistical CSIT , 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference.
[157] Aylin Yener,et al. MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom , 2013, IEEE Trans. Inf. Theory.
[158] A. Lee Swindlehurst,et al. Joint transmit design and node selection for one-way and two-way untrusted relay channels , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.
[159] Polar coding for secret-key generation , 2013, 2013 IEEE Information Theory Workshop (ITW).
[160] Ya-Feng Liu,et al. Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.
[161] Zhu Han,et al. Physical-Layer Security in Distributed Wireless Networks Using Matching Theory , 2013, IEEE Transactions on Information Forensics and Security.
[162] Erik G. Larsson,et al. Scaling Up MIMO: Opportunities and Challenges with Very Large Arrays , 2012, IEEE Signal Process. Mag..
[163] Meixia Tao,et al. Secure beamforming for MIMO two-way transmission with an untrusted relay , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[164] A. Lee Swindlehurst,et al. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.
[165] Xianda Zhang,et al. SLNR-Based Transmit Beamforming for MIMO Wiretap Channel , 2013, Wirel. Pers. Commun..
[166] Zhiguo Ding,et al. Rate Regions for Multiple Access Channel With Conference and Secrecy Constraints , 2013, IEEE Transactions on Information Forensics and Security.
[167] Tao Yang,et al. Design of Irregular Repeat-Accumulate Coded Physical-Layer Network Coding for Gaussian Two-Way Relay Channels , 2013, IEEE Transactions on Communications.
[168] Aylin Yener,et al. Providing Secrecy With Structured Codes: Two-User Gaussian Channels , 2014, IEEE Transactions on Information Theory.
[169] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[170] Xiangyun Zhou,et al. When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? , 2014, IEEE Transactions on Information Forensics and Security.
[171] Erchin Serpedin,et al. A comparative review on the wireless implantable medical devices privacy and security , 2014, 2014 4th International Conference on Wireless Mobile Communication and Healthcare - Transforming Healthcare Through Innovations in Mobile and Wireless Technologies (MOBIHEALTH).
[172] Vijay K. Bhargava,et al. Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.
[173] Cong Ling,et al. Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.
[174] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[175] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.
[176] Physical Layer Secret Key Exchange Using Phase Randomization in MIMO-OFDM , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[177] Sanjay Jha,et al. Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints , 2014, IEEE Transactions on Information Forensics and Security.
[178] Mohamed-Slim Alouini,et al. On the Secrecy Capacity of the Wiretap Channel With Imperfect Main Channel Estimation , 2014, IEEE Transactions on Communications.
[179] Lajos Hanzo,et al. Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.
[180] Bayan S. Sharif,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.
[181] Lifeng Wang,et al. Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[182] Xianbin Wang,et al. Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.
[183] Wenbo Wang,et al. Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks , 2014, IEEE Transactions on Signal Processing.
[184] Aylin Yener,et al. MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States , 2014, IEEE Transactions on Information Theory.
[185] Jong-Shi Pang,et al. A New Decomposition Method for Multiuser DC-Programming and Its Applications , 2014, IEEE Transactions on Signal Processing.
[186] Matthias Hollick,et al. Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems , 2014, NDSS.
[187] Bin Xia,et al. Secure communications of cellular users in device-to-device communication underlaying cellular networks , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).
[188] Xuemin Shen,et al. Channel-based physical layer authentication , 2014, 2014 IEEE Global Communications Conference.
[189] Tony Q. S. Quek,et al. Secret Group Key Generation in Physical Layer for Mesh Topology , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[190] Werner Henkel,et al. LDPC Code Design Aspects for Physical-Layer Key Reconciliation , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[191] Hüseyin Arslan,et al. Secure communication in frequency selective channels with fade-avoiding subchannel usage , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[192] Khairi Ashour Hamdi,et al. Silent Antenna Hopping Transmission Technique for Secure Millimeter-Wave Wireless Communication , 2014, GLOBECOM 2014.
[193] Kai Zeng,et al. Physical layer challenge-response authentication in wireless networks with relay , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[194] Minyi Guo,et al. Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs , 2015, IEEE Transactions on Parallel and Distributed Systems.
[195] Xiaoming Chen,et al. Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.
[196] Tony Q. S. Quek,et al. Jamming-Aided Secure Communication in Massive MIMO Rician Channels , 2015, IEEE Transactions on Wireless Communications.
[197] Hüseyin Arslan,et al. A survey: Spoofing attacks in physical layer security , 2015, 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops).
[198] Saeedeh Parsaeefard,et al. Secure Robust Ergodic Uplink Resource Allocation in Relay-Assisted Cognitive Radio Networks , 2015, IEEE Transactions on Signal Processing.
[199] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[200] Pritam Mukherjee,et al. Secure Degrees of Freedom of MIMO Rayleigh Block Fading Wiretap Channels With No CSI Anywhere , 2015, IEEE Transactions on Wireless Communications.
[201] Balasubramaniam Natarajan,et al. Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks , 2015, IEEE Transactions on Information Forensics and Security.
[202] Jinho Choi,et al. Secret Key Agreement for Massive MIMO Systems with Two-Way Training under Pilot Contamination Attack , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[203] Zhen Yang,et al. Physical-Layer Authentication for Multi-Carrier Transmission , 2015, IEEE Communications Letters.
[204] Qi Xiong,et al. An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems , 2015, IEEE Transactions on Information Forensics and Security.
[205] Jeffrey H. Reed,et al. PHY-Layer Resiliency in OFDM Communications: A Tutorial , 2015, IEEE Communications Surveys & Tutorials.
[206] Yao Zheng,et al. Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security , 2015, IEEE Wireless Communications Letters.
[207] Eduard A. Jorswieck,et al. Secrecy in the two-way untrusted relay channel with compute-and-forward , 2015, 2015 IEEE International Conference on Communications (ICC).
[208] Rahim Tafazolli,et al. Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks , 2015, Secur. Commun. Networks.
[209] Xinbing Wang,et al. Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.
[210] Fredrik Rusek,et al. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.
[211] Ming Li,et al. MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks , 2015, IEEE Internet of Things Journal.
[212] Michael A. Temple,et al. Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA Fingerprints , 2015, IEEE Transactions on Information Forensics and Security.
[213] Yi Hong,et al. Artificial Noise Revisited , 2014, IEEE Transactions on Information Theory.
[214] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[215] Danda B. Rawat,et al. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[216] GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags , 2016, IEEE/ACM Transactions on Networking.
[217] Tony Q. S. Quek,et al. Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.
[218] Vijay K. Bhargava,et al. Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.
[219] Khairi Ashour Hamdi,et al. Switched Phased-Array Transmission Architecture for Secure Millimeter-Wave Wireless Communication , 2016, IEEE Transactions on Communications.
[220] Donald F. Towsley,et al. Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.
[221] Tao Zhang,et al. Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation , 2016, IEEE Transactions on Wireless Communications.
[222] Zhijie Jerry Shi,et al. RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements , 2016, IEEE Communications Magazine.
[223] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[224] Jie Xu,et al. Proactive eavesdropping via cognitive jamming in fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).
[225] Jie Xu,et al. Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.