Pilot and Data Power Allocation in Poisson Interference Field with Protected Zone for Physical-Layer Security

[1]  Joonhyuk Kang,et al.  Physical-layer security enhancement via power allocation between pilot and data jamming , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[2]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[3]  Andreas Antoniou,et al.  Practical Optimization: Algorithms and Engineering Applications , 2007, Texts in Computer Science.

[4]  Yao-Win Peter Hong,et al.  How much training is enough for secrecy beamforming with artificial noise , 2012, 2012 IEEE International Conference on Communications (ICC).

[5]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.

[6]  D. Hunter,et al.  A Tutorial on MM Algorithms , 2004 .

[7]  Jinhong Yuan,et al.  Optimization of Code Rates in SISOME Wiretap Channels , 2015, IEEE Transactions on Wireless Communications.

[8]  Mounir Ghogho,et al.  Physical-Layer Secrecy of MIMO Communications in the Presence of a Poisson Random Field of Eavesdroppers , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Wan Choi,et al.  Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.

[11]  B. Shihada,et al.  What should 6G be? , 2019, Nature Electronics.

[12]  William H. Press,et al.  Numerical recipes in Fortran 77 : the art of scientificcomputing. , 1992 .

[13]  Hui-Ming Wang,et al.  Optimal Power Allocation for Artificial Noise Under Imperfect CSI Against Spatially Random Eavesdroppers , 2016, IEEE Transactions on Vehicular Technology.

[14]  Xiangyun Zhou,et al.  Channel training design in full-duplex wiretap channels to enhance physical layer security , 2017, 2017 IEEE International Conference on Communications (ICC).

[15]  Matthew R. McKay,et al.  Analysis and Design of Wireless Ad Hoc Networks With Channel Estimation Errors , 2013, IEEE Transactions on Signal Processing.

[16]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[17]  Naofal Al-Dhahir,et al.  On the Delay/Throughput-Security Tradeoff in Wiretap TDMA Networks With Buffered Nodes , 2019, IEEE Transactions on Wireless Communications.