An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty
暂无分享,去创建一个
[1] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[2] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.
[3] Matthew R. McKay,et al. Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks , 2013, IEEE Transactions on Information Forensics and Security.
[4] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.
[5] Xiangyun Zhou,et al. Wireless Physical Layer Security with Imperfect Channel State Information: A Survey , 2013, ArXiv.
[6] Yi Hong,et al. Practical Secrecy using Artificial Noise , 2013, IEEE Communications Letters.
[7] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[8] Vijay K. Bhargava,et al. Secrecy analysis of multi-cell massive MIMO systems with RCI precoding and artificial noise transmission , 2014, 2014 6th International Symposium on Communications, Control and Signal Processing (ISCCSP).
[9] Elza Erkip,et al. A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.
[10] Alfred O. Hero,et al. Secure space-time communication , 2003, IEEE Trans. Inf. Theory.
[11] Zhu Han,et al. Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..
[12] Yi Hong,et al. Guaranteeing Positive Secrecy Capacity for MIMOME Wiretap Channels With Finite-Rate Feedback Using Artificial Noise , 2015, IEEE Transactions on Wireless Communications.
[13] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[14] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[15] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[16] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[17] Yueming Cai,et al. A New Secure Transmission Scheme With Outdated Antenna Selection , 2015, IEEE Transactions on Information Forensics and Security.
[18] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.
[19] Wei Xu,et al. On Performance and Feedback Strategy of Secure Multiuser Communications With MMSE Channel Estimate , 2016, IEEE Transactions on Wireless Communications.
[20] Joonhyuk Kang,et al. Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy , 2011, 2011 IEEE International Conference on Communications (ICC).
[21] Robert W. Heath,et al. An overview of limited feedback in wireless communication systems , 2008, IEEE Journal on Selected Areas in Communications.
[22] Vijay K. Bhargava,et al. Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.
[23] MinChul Ju,et al. Secrecy outage probability of amplify-and-forward transmission with multi-antenna relay in presence of eavesdropper , 2014, 2014 IEEE International Conference on Communications (ICC).
[24] Shih-Chun Lin,et al. On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT , 2012, IEEE Transactions on Information Forensics and Security.
[25] Roy D. Yates,et al. Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[26] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[27] Jyoti Verma,et al. Trends in Telecommunications Technologies , 2018 .
[28] J. Nicholas Laneman,et al. Information-spectrum methods for information-theoretic security , 2009, 2009 Information Theory and Applications Workshop.
[29] Eduard A. Jorswieck,et al. To avoid or not to avoid CSI leakage in physical layer secret communication systems , 2015, IEEE Communications Magazine.
[30] Matthieu R. Bloch,et al. Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.
[31] M. Lavanya,et al. Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection with outdated CSI , 2017 .
[32] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[33] Zhi Chen,et al. Non-asymptotic analysis of secrecy capacity in massive MIMO system , 2015, 2015 IEEE International Conference on Communications (ICC).
[34] Matthieu R. Bloch,et al. Exploiting Partial Channel State Information for Secrecy over Wireless Channels , 2013, IEEE Journal on Selected Areas in Communications.
[35] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.
[36] Aylin Yener,et al. Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.
[37] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[38] Amir Salman Avestimehr,et al. Blind wiretap channel with delayed CSIT , 2014, 2014 IEEE International Symposium on Information Theory.
[39] H. Vincent Poor,et al. On the secure degrees of freedom in the K-user Gaussian interference channel , 2008, 2008 IEEE International Symposium on Information Theory.
[40] Derrick Wing Kwan Ng,et al. Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.
[41] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[42] Matti Latva-aho,et al. Secrecy Analysis of Transmit Antenna Selection Cooperative Schemes With No Channel State Information at the Transmitter , 2015, IEEE Transactions on Communications.
[43] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[44] Azzam Al-Nahari,et al. Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers , 2016, IET Commun..
[45] Roy D. Yates,et al. Secret Communication with a Fading Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.
[46] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[47] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[48] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[49] H. Vincent Poor,et al. Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.
[50] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[51] Pritam Mukherjee,et al. Secure Degrees of Freedom of MIMO Rayleigh Block Fading Wiretap Channels With No CSI Anywhere , 2015, IEEE Transactions on Wireless Communications.
[52] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[53] Mustafa Cenk Gursoy,et al. Relay beamforming strategies for physical-layer security , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[54] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[55] Nan Liu,et al. Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.
[56] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[57] Mohamed-Slim Alouini,et al. On the Secrecy Capacity of the Wiretap Channel With Imperfect Main Channel Estimation , 2014, IEEE Transactions on Communications.
[58] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[59] Eduard A. Jorswieck,et al. On the Fast Fading Gaussian Wiretap Channel With Statistical Channel State Information at the Transmitter , 2016, IEEE Transactions on Information Forensics and Security.
[60] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[61] Athina P. Petropulu,et al. On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.
[62] Sennur Ulukus,et al. Secrecy capacity region of the Gaussian multi-receiver wiretap channel , 2009, 2009 IEEE International Symposium on Information Theory.
[63] Hsiao-Hwa Chen,et al. Physical Layer Security in Multi-Cell MISO Downlinks With Incomplete CSI—A Unified Secrecy Performance Analysis , 2014, IEEE Transactions on Signal Processing.
[64] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[65] Vijay K. Bhargava,et al. Secure transmission in multi-cell massive MIMO systems , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[66] Hyuckjae Lee,et al. Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR , 2011, IEEE Transactions on Information Theory.
[67] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[68] K. J. Ray Liu,et al. An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.
[69] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[70] Tho Le-Ngoc,et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.
[71] Mohamed-Slim Alouini,et al. On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[72] Christos Bouras,et al. Trends in Telecommunications Technologies , 2010 .
[73] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[74] Qiang Li,et al. Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.
[75] Shlomo Shamai,et al. Rate splitting and sharing for degraded broadcast channel with secrecy outside a bounded range , 2015, ISIT.
[76] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[77] Mohamed-Slim Alouini,et al. Secure Broadcasting With Imperfect Channel State Information at the Transmitter , 2016, IEEE Transactions on Wireless Communications.
[78] Mohamed-Slim Alouini,et al. On the Secrecy Capacity Region of the Block-Fading BCC with Limited CSI Feedback , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[79] Elza Erkip,et al. Diversity-Multiplexing Tradeoff for the Multiple-Antenna Wire-tap Channel , 2011, IEEE Transactions on Wireless Communications.
[80] Mohamed-Slim Alouini,et al. On the Secrecy Capacity of the Multiple-Antenna Wiretap Channel with Limited CSI Feedback , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[81] Robert W. Heath,et al. Grassmannian beamforming for multiple-input multiple-output wireless systems , 2003, IEEE Trans. Inf. Theory.
[82] Xin Wang,et al. Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.
[83] Shlomo Shamai,et al. Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding , 2009, EURASIP J. Wirel. Commun. Netw..
[84] Derrick Wing Kwan Ng,et al. Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.
[85] Hyuckjae Lee,et al. Secrecy capacity over correlated ergodic fading channel , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[86] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[87] Mohamed-Slim Alouini,et al. On the secrecy capacity of the broadcast wiretap channel with imperfect channel state information , 2014, 2014 IEEE Global Communications Conference.
[88] Shlomo Shamai,et al. Secrecy Degrees of Freedom of MIMO Broadcast Channels With Delayed CSIT , 2011, IEEE Transactions on Information Theory.
[89] Chong-Yung Chi,et al. On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2009, IEEE Transactions on Wireless Communications.
[90] S. P. Lloyd,et al. Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.
[91] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[92] Raef Bassily,et al. Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks , 2013, IEEE Transactions on Signal Processing.
[93] Holger Boche,et al. Strong secrecy in arbitrarily varying wiretap channels , 2012, 2012 IEEE Information Theory Workshop.
[94] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[95] Vijay K. Bhargava,et al. Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.
[96] Mounir Ghogho,et al. Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.
[97] Shlomo Shamai,et al. An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009, 2009 IEEE International Symposium on Information Theory.
[98] Jin Xu,et al. Capacity Bounds for Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[99] Ashish Khisti,et al. Secure Broadcasting with Multiuser Diversity , 2006 .
[100] Shlomo Shamai,et al. A Broadcast Approach for Fading Wiretap Channels , 2014, IEEE Transactions on Information Theory.
[101] Aydin Sezgin,et al. Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.
[102] Xiaoming Chen,et al. Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback , 2013, IEEE Wireless Communications Letters.
[103] Mustafa Cenk Gursoy,et al. Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.
[104] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[105] Mohamed-Slim Alouini,et al. Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback , 2012, IEEE Transactions on Wireless Communications.
[106] H. Vincent Poor,et al. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[107] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[108] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[109] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[110] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[111] Yiyang Pei,et al. Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.
[112] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[113] Nuwan S. Ferdinand,et al. Effects of Outdated CSI on the Secrecy Performance of MISO Wiretap Channels with Transmit Antenna Selection , 2013, IEEE Communications Letters.
[114] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[115] Pritam Mukherjee,et al. Fading wiretap channel with no CSI anywhere , 2013, 2013 IEEE International Symposium on Information Theory.
[116] Xianda Zhang,et al. Secure Relay Beamforming With Imperfect Channel Side Information , 2013, IEEE Transactions on Vehicular Technology.
[117] Fredrik Rusek,et al. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.
[118] Mohamed-Slim Alouini,et al. On the secrecy capacity of the MISO wiretap channel under imperfect channel estimation , 2014, 2014 IEEE Global Communications Conference.
[119] Mustafa Cenk Gursoy,et al. Secure relay beamforming over cognitive radio channels , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[120] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[121] Shlomo Shamai,et al. Secure Degrees of Freedom of MIMO X-Channels With Output Feedback and Delayed CSIT , 2013, IEEE Transactions on Information Forensics and Security.
[122] Mohamed-Slim Alouini,et al. Achievable Rates of Secure Transmission in Gaussian MISO Channel With Imperfect Main Channel Estimation , 2015, IEEE Transactions on Wireless Communications.
[123] Yi Hong,et al. Artificial Noise Revisited , 2014, IEEE Transactions on Information Theory.
[124] Theodoros Tsiligkaridis,et al. Secure MIMO Communications Under Quantized Channel Feedback in the Presence of Jamming , 2014, IEEE Transactions on Signal Processing.
[125] H. Vincent Poor,et al. Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.
[126] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[127] Liuqing Yang,et al. Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.