Physical layer security schemes for MIMO systems: an overview
暂无分享,去创建一个
[1] V. A. Fadeev,et al. Estimation of capabilities of cooperative CubeSat systems based on Alamouti transmission scheme , 2018, 2018Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO).
[2] I-Tai Lu,et al. Asynchronous Reception Effects on Distributed Massive MIMO-OFDM System , 2019, IEEE Transactions on Communications.
[3] Hsiao-Hwa Chen,et al. Secrecy Capacity Analysis of Artificial Noisy MIMO Channels—An Approach Based on Ordered Eigenvalues of Wishart Matrices , 2017, IEEE Transactions on Information Forensics and Security.
[4] Takahiko Saba,et al. An artificial fast fading generation scheme for physical layer security of MIMO-OFDM systems , 2015, 2015 9th International Conference on Signal Processing and Communication Systems (ICSPCS).
[5] Marwan Krunz,et al. Exploiting Frame Preamble Waveforms to Support New Physical-Layer Functions in OFDM-Based 802.11 Systems , 2017, IEEE Transactions on Wireless Communications.
[6] Andreas F. Molisch,et al. Hybrid Beamforming for Massive MIMO: A Survey , 2017, IEEE Communications Magazine.
[7] Balasubramaniam Natarajan,et al. Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks , 2015, IEEE Transactions on Information Forensics and Security.
[8] Ming Li,et al. Jamming Resilient Communication Using MIMO Interference Cancellation , 2016, IEEE Transactions on Information Forensics and Security.
[9] Elias Yaacoub,et al. Achieving physical layer security with massive MIMO beamforming , 2017, 2017 11th European Conference on Antennas and Propagation (EUCAP).
[10] Zhiguo Ding,et al. Hybrid Spatio-Temporal Artificial Noise Design for Secure MIMOME-OFDM Systems , 2017, IEEE Transactions on Vehicular Technology.
[11] Lin Bai,et al. Space Time Block Coding aided physical layer security in Gaussian MIMO channels , 2017, 2017 14th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
[12] Aiqun Hu,et al. Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[13] Hong Wen,et al. Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions , 2014, IEEE Wireless Communications Letters.
[14] Peng Ning,et al. No time to demodulate - fast physical layer verification of friendly jamming , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[15] Yasir Rahmatallah,et al. Peak-To-Average Power Ratio Reduction in OFDM Systems: A Survey And Taxonomy , 2013, IEEE Communications Surveys & Tutorials.
[16] Christian Waldschmidt,et al. MIMO-OFDM Radar Using a Linear Frequency Modulated Carrier to Reduce Sampling Requirements , 2018, IEEE Transactions on Microwave Theory and Techniques.
[17] Hsiao-Hwa Chen,et al. A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.
[18] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[19] Peter J. Winzer,et al. A computationally efficient shift-register based information scrambling approach to physical layer security in MIMO-SDM systems , 2016, 2016 Optical Fiber Communications Conference and Exhibition (OFC).
[20] Symeon Chatzinotas,et al. Directional Modulation Via Symbol-Level Precoding: A Way to Enhance Security , 2016, IEEE Journal of Selected Topics in Signal Processing.
[21] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[22] Jinho Choi,et al. Secret key transmission based on channel reciprocity for secure IoT , 2016, 2016 European Conference on Networks and Communications (EuCNC).
[23] Lei Li,et al. A Virtual MIMO based anti-jamming strategy for cognitive radio networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[24] Naofal Al-Dhahir,et al. Enhancing the PHY-Layer Security of MIMO Buffer-Aided Relay Networks , 2016, IEEE Wireless Communications Letters.
[25] Emad Alsusa,et al. Secret Key Exchange and Authentication via Randomized Spatial Modulation and Phase Shifting , 2018, IEEE Transactions on Vehicular Technology.
[26] Berna Özbek,et al. Space-frequency grouping based key extraction for MIMO-OFDM systems , 2017, 2017 International Symposium on Wireless Communication Systems (ISWCS).
[27] Yajun Zhang,et al. Joint transmit antenna selection and jamming for security enhancement in MIMO wiretap channels , 2015, 2015 IEEE/CIC International Conference on Communications in China (ICCC).
[28] Derrick Wing Kwan Ng,et al. Key technologies for 5G wireless systems , 2017 .
[29] Peter J. Winzer,et al. Enhanced physical layer security of MIMO-SDM systems through information scrambling , 2015, 2015 European Conference on Optical Communication (ECOC).
[30] Victor C. M. Leung,et al. Securing Uplink Transmission for Lightweight Single-Antenna UEs in the Presence of a Massive MIMO Eavesdropper , 2016, IEEE Access.
[31] Fei Wang,et al. Security in Uplink MU-MIMO Networks: Poster Abstract , 2017, IoTDI.
[32] Hüseyin Arslan,et al. Secure Spatial Multiple Access Using Directional Modulation , 2018, IEEE Transactions on Wireless Communications.
[33] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[34] Mohamed-Slim Alouini,et al. On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.
[35] Balasubramaniam Natarajan,et al. Evaluating Node Reliability in Cooperative MIMO Networks , 2016, IEEE Transactions on Information Forensics and Security.
[36] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[37] Emad Alsusa,et al. Secret Key Exchange Using Private Random Precoding in MIMO FDD and TDD Systems , 2017, IEEE Transactions on Vehicular Technology.
[38] Christos Masouros,et al. Constructive interference based secure precoding , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[39] Emad Alsusa,et al. Secret key exchange under physical layer security using MIMO private random precoding in FDD systems , 2016, 2016 IEEE International Conference on Communications (ICC).
[40] Can Emre Koksal,et al. Securing massive MIMO at the physical layer , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[41] William E. Burr,et al. Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .
[42] Amin Babiker,et al. A Comparison between IEEE 802.11 n and ac Standards , 2015 .
[43] Yun Zhang,et al. Hybrid Massive MIMO for Secure Transmissions Against Stealthy Eavesdroppers , 2018, IEEE Communications Letters.
[44] Zouhair Al-qudah,et al. Singular Value Decomposition: Principles and Applications in Multiple Input Multiple Output Communication System , 2017 .
[45] Waqar Mahmood,et al. Novel schemes for interference-resilient OFDM wireless communication , 2017, Int. J. Commun. Syst..
[46] Sundeep Rangan,et al. Achieving Ultra-Low Latency in 5G Millimeter Wave Cellular Networks , 2016, IEEE Communications Magazine.
[47] Emad Alsusa,et al. Secret key establishment technique using channel state information driven phase randomisation in multiple-input multiple-output orthogonal frequency division multiplexing , 2017, IET Inf. Secur..
[48] Pekka Kyosti,et al. A Step Toward 5G in 2020: Low-cost OTA performance evaluation of massive MIMO base stations. , 2017, IEEE Antennas and Propagation Magazine.
[49] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[50] Theodore S. Rappaport,et al. Overview of Millimeter Wave Communications for Fifth-Generation (5G) Wireless Networks—With a Focus on Propagation Models , 2017, IEEE Transactions on Antennas and Propagation.
[51] Takahiko Saba,et al. A physical layer security scheme employing imaginary receiver for multiuser MIMO-OFDM systems , 2017, 2017 IEEE International Conference on Communications (ICC).
[52] Emad Alsusa,et al. A MIMO Precoding Based Physical Layer Security Technique for Key Exchange Encryption , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).
[53] J.A.C. Bingham,et al. Multicarrier modulation for data transmission: an idea whose time has come , 1990, IEEE Communications Magazine.
[54] Jinho Choi. Secret key transmission for OFDM based machine type communications , 2017, Journal of Communications and Networks.
[55] R. M. A. P. Rajatheva,et al. Physical layer security for relay assisted MIMO D2D communication , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[56] Hong Wen,et al. The performance of the MIMO physical layer security system with imperfect CSI , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[57] Zhi Chen,et al. Improving Wireless Physical Layer Security via Exploiting Co-Channel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[58] Navrati Saxena,et al. Efficient IoT Gateway over 5G Wireless: A New Design with Prototype and Implementation Results , 2017, IEEE Communications Magazine.
[59] Athanasios V. Vasilakos,et al. Physical Layer Security Based on Interference Alignment in K-User MIMO Y Wiretap Channels , 2017, IEEE Access.
[60] Junqing Zhang,et al. Verification of Key Generation from Individual OFDM Subcarrier's Channel Response , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[61] Victor C. M. Leung,et al. Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper , 2016, IEEE Access.
[62] Chengwen Xing,et al. Millimeter-Wave Secrecy Beamforming Designs for Two-Way Amplify-and-Forward MIMO Relaying Networks , 2017, IEEE Transactions on Vehicular Technology.
[63] Zhi Xue,et al. Security in MIMO wireless hybrid channel with artificial noise , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).
[64] J. L. Massey,et al. Cryptography ― a selective survey , 1986 .
[65] Lin Zhang,et al. High Security Orthogonal Factorized Channel Scrambling Scheme with Location Information Embedded for MIMO-Based VLC System , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).
[66] Kenta Umebayashi,et al. A study on secure pilot signal design for OFDM systems , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.
[67] Fei Wang,et al. Poster Abstract: Security in Uplink MU-MIMO Networks , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).
[68] Weihua Zhuang,et al. Channel-Based Authentication Game in MIMO Systems , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[69] Emad Alsusa,et al. PHY-SEC: Secret key exchange and authentication via Random Spatial Modulation and phase shifting , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[70] Ramjee Prasad,et al. OFDM for Wireless Communications Systems , 2004 .
[71] Shabnam Sodagari,et al. Efficient jamming attacks on MIMO channels , 2012, 2012 IEEE International Conference on Communications (ICC).
[72] Xiuzhen Cheng,et al. Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[73] Elias Yaacoub. On secret key generation with massive MIMO antennas using time-frequency-space dimensions , 2016, 2016 IEEE Middle East Conference on Antennas and Propagation (MECAP).
[74] Matthieu R. Bloch,et al. Physical Layer Security , 2020, Encyclopedia of Wireless Networks.
[75] Weihua Zhuang,et al. Game Theoretic Study on Channel-Based Authentication in MIMO Systems , 2017, IEEE Transactions on Vehicular Technology.
[76] Emil Björnson,et al. Jamming-Resistant Receivers for the Massive MIMO Uplink , 2017, IEEE Transactions on Information Forensics and Security.
[77] Haji M. Furqan,et al. Secret key generation using channel quantization with SVD for reciprocal MIMO channels , 2016, 2016 International Symposium on Wireless Communication Systems (ISWCS).
[78] Hong Wen,et al. Combining MIMO beamforming with security codes to achieve unconditional communication security , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).
[79] Xiaoming Chen,et al. Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective , 2015, IEEE Systems Journal.
[80] Zhi Ding,et al. Exploiting Multi-Antenna Non-Reciprocal Channels for Shared Secret Key Generation , 2016, IEEE Transactions on Information Forensics and Security.
[81] Chung G. Kang,et al. MIMO-OFDM Wireless Communications with MATLAB , 2010 .
[82] Stefano Tomasin. Comparison Between Asymmetric and Symmetric Channel-Based Authentication for MIMO Systems , 2017, WSA.
[83] Theodore S. Rappaport,et al. A novel millimeter-wave channel simulator and applications for 5G wireless communications , 2017, 2017 IEEE International Conference on Communications (ICC).
[84] Mario E. Magaña,et al. Post-quantum hybrid security mechanism for MIMO systems , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).
[85] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[86] Peng Ning,et al. MCR Decoding: A MIMO approach for defending against wireless jamming attacks , 2014, 2014 IEEE Conference on Communications and Network Security.
[87] Joonhyuk Kang,et al. Enhancing physical-layer security in MISO wiretap channel with pilot-assisted channel estimation: Beamforming design for pilot jamming , 2016, 2016 10th International Conference on Signal Processing and Communication Systems (ICSPCS).
[88] Anke Schmeink,et al. Comparison and evaluation between FBMC and OFDM systems , 2015, WSA.
[89] Dongtang Ma,et al. Secret key generation via random beamforming in stationary environment , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[90] Guillermo Morales-Luna,et al. Secret key agreement based on a communication through wireless MIMO fading channels , 2016, 2016 Federated Conference on Computer Science and Information Systems (FedCSIS).
[91] Benoît Champagne,et al. Non-linear transceiver design for secure communications with artificial noise-assisted MIMO relay , 2017, IET Commun..