A Survey of Optimization Approaches for Wireless Physical Layer Security

Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry. The research on physical layer security mainly focuses either on the secrecy capacity/achievable secrecy rate/capacity-equivocation region from the perspective of information theory, or on the security designs from the viewpoints of optimization and signal processing. Because of its importance in security designs, the latter research direction is surveyed in a comprehensive way in this paper. The survey begins with typical wiretap channel models to cover common scenarios and systems. The topics on physical-layer security designs are then summarized from resource allocation, beamforming/precoding, and antenna/node selection and cooperation. Based on the aforementioned schemes, the performance metrics and fundamental optimization problems are discussed, which are generally adopted in security designs. Thereafter, the state of the art of optimization approaches on each research topic of physical layer security is reviewed from four categories of optimization problems, such as secrecy rate maximization, secrecy outrage probability minimization, power consumption minimization, and secure energy efficiency maximization. Furthermore, the impacts of channel state information on optimization and design are discussed. Finally, the survey concludes with the observations on potential future directions and open challenges.

[1]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.

[2]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[3]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[4]  H. Vincent Poor,et al.  MIMO Beamforming for Secure and Energy-Efficient Wireless Communication , 2017, IEEE Signal Processing Letters.

[5]  S. Weber,et al.  Transmit power minimization under secrecy capacity constraint in cooperative wireless communications , 2009, 2009 IEEE/SP 15th Workshop on Statistical Signal Processing.

[6]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[7]  Fadel F. Digham,et al.  Power-efficient wireless OFDMA using limited-rate feedback , 2008, IEEE Transactions on Wireless Communications.

[8]  Jianping Pan,et al.  Minimizing Secrecy Outage Probability in Multiuser Wireless Systems With Stochastic Traffic , 2017, IEEE Transactions on Vehicular Technology.

[9]  Taewon Hwang,et al.  Energy Efficient Communication for Secure D2D Underlaid Cellular Networks , 2017, IEEE Transactions on Vehicular Technology.

[10]  Derrick Wing Kwan Ng,et al.  Secure and Green SWIPT in Distributed Antenna Networks With Limited Backhaul Capacity , 2014, IEEE Transactions on Wireless Communications.

[11]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[12]  Wan Choi,et al.  Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection: Secure DoF and Jammer Scaling Law , 2014, IEEE Transactions on Signal Processing.

[13]  Huiming Wang,et al.  Robust Joint Beamforming and Jamming for Secure AF Networks: Low-Complexity Design , 2015, IEEE Transactions on Vehicular Technology.

[14]  Marco Baldi,et al.  Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Victor C. M. Leung,et al.  Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.

[16]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[17]  H. Vincent Poor,et al.  Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization , 2011, IEEE Transactions on Information Forensics and Security.

[18]  Inkyu Lee,et al.  Beamforming and Power Splitting Designs for AN-Aided Secure Multi-User MIMO SWIPT Systems , 2017, IEEE Transactions on Information Forensics and Security.

[19]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[20]  Qiang Li,et al.  Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.

[21]  Hui-Ming Wang,et al.  Optimal Power Allocation for Artificial Noise Under Imperfect CSI Against Spatially Random Eavesdroppers , 2016, IEEE Transactions on Vehicular Technology.

[22]  Xuemin Shen,et al.  Secrecy-Based Energy-Efficient Data Offloading via Dual Connectivity Over Unlicensed Spectrums , 2016, IEEE Journal on Selected Areas in Communications.

[23]  Jeffrey G. Andrews,et al.  Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.

[24]  Sang Wu Kim,et al.  Adapting Rate and Power for Maximizing Secrecy Energy Efficiency , 2017, IEEE Communications Letters.

[25]  Richard Demo Souza,et al.  Energy Efficiency of Repetition Coding and Parallel Coding Relaying Under Partial Secrecy Regime , 2016, IEEE Access.

[26]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[27]  S. Schaible Fractional Programming. II, On Dinkelbach's Algorithm , 1976 .

[28]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[29]  Huiming Wang,et al.  Secrecy Transmission With a Helper: To Relay or to Jam , 2015, IEEE Transactions on Information Forensics and Security.

[30]  Huiming Wang,et al.  Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.

[31]  Sheng Chen,et al.  Secure Communications for Dual-Polarized MIMO Systems , 2017, IEEE Transactions on Signal Processing.

[32]  Iain B. Collings,et al.  Large System Analysis of Linear Precoding in MISO Broadcast Channels with Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.

[33]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[34]  Zhu Han,et al.  Energy Efficient Secure Communication Over Decode-and-Forward Relay Channels , 2015, IEEE Transactions on Communications.

[35]  Emil Björnson,et al.  A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments , 2013, IEEE Transactions on Communications.

[36]  Tran Trung Duy,et al.  Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.

[37]  Björn E. Ottersten,et al.  Physical Layer Security in Multibeam Satellite Systems , 2012, IEEE Transactions on Wireless Communications.

[38]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[39]  Zhigang Cao,et al.  Outage optimal subcarrier allocation for downlink secure OFDMA systems , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[40]  H. Vincent Poor,et al.  Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.

[41]  Meixia Tao,et al.  Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.

[42]  Zhu Han,et al.  Secure Green Communication via Untrusted Two-Way Relaying: A Physical Layer Approach , 2016, IEEE Transactions on Communications.

[43]  A. Lee Swindlehurst,et al.  On the Optimality of Linear Precoding for Secrecy in the MIMO Broadcast Channel , 2013, IEEE Journal on Selected Areas in Communications.

[44]  Mustafa Cenk Gursoy Secure Communication in the Low-SNR Regime , 2012, IEEE Transactions on Communications.

[45]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[46]  Feng Liu,et al.  Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.

[47]  Le Thi Hoai An,et al.  Recent Advances in DC Programming and DCA , 2013, Trans. Comput. Collect. Intell..

[48]  Inkyu Lee,et al.  Precoder Designs for MIMO Gaussian Multiple Access Wiretap Channels , 2017, IEEE Transactions on Vehicular Technology.

[49]  Il-Min Kim,et al.  Secure Transmission for Multiuser Relay Networks , 2015, IEEE Transactions on Wireless Communications.

[50]  Farshad Lahouti,et al.  Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis , 2013, IEEE Transactions on Communications.

[51]  Lajos Hanzo,et al.  Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.

[52]  Nicola Laurenti,et al.  Power Allocation in Multiuser Parallel Gaussian Broadcast Channels With Common and Confidential Messages , 2016, IEEE Transactions on Communications.

[53]  H. Vincent Poor,et al.  An information theoretic framework for energy efficient secrecy , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[54]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[55]  Halim Yanikomeroglu,et al.  Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary , 2017, IEEE Transactions on Wireless Communications.

[56]  Jinhong Yuan,et al.  Transmit Antenna Selection with Alamouti Coding and Power Allocation in MIMO Wiretap Channels , 2014, IEEE Transactions on Wireless Communications.

[57]  Xiaoming Chen,et al.  Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.

[58]  Lie-Liang Yang,et al.  Adaptive cooperation schemes for energy efficient physical layer security , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[59]  Zhu Han,et al.  Achieving High Energy Efficiency and Physical-Layer Security in AF Relaying , 2016, IEEE Transactions on Wireless Communications.

[60]  Feng Liu,et al.  Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems , 2015, IEEE Transactions on Vehicular Technology.

[61]  Robert Schober,et al.  MIMO Wiretap Channels: Secure Transmission Using Transmit Antenna Selection and Receive Generalized Selection Combining , 2013, IEEE Communications Letters.

[62]  Björn E. Ottersten,et al.  Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling , 2013, IEEE Signal Processing Letters.

[63]  Eduard A. Jorswieck,et al.  Energy-efficient secure communications in MISO-SE systems , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.

[64]  Derrick Wing Kwan Ng,et al.  Multiobjective Resource Allocation for Secure Communication in Cognitive Radio Networks With Wireless Information and Power Transfer , 2014, IEEE Transactions on Vehicular Technology.

[65]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[66]  Urs Niesen,et al.  Adaptive Alternating Minimization Algorithms , 2007, IEEE Transactions on Information Theory.

[67]  Daniel Pérez Palomar,et al.  A tutorial on decomposition methods for network utility maximization , 2006, IEEE Journal on Selected Areas in Communications.

[68]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.

[69]  H. Vincent Poor,et al.  Cooperative Beamforming and User Selection for Improving the Security of Relay-Aided Systems , 2015, IEEE Transactions on Communications.

[70]  Qiang Li,et al.  Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.

[71]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[72]  Javier López,et al.  Relay selection for secure 5G green communications , 2015, Telecommun. Syst..

[73]  Jong-Ho Lee,et al.  Optimal Power Allocation for Physical Layer Security in Multi-Hop DF Relay Networks , 2016, IEEE Transactions on Wireless Communications.

[74]  Xianda Zhang,et al.  Secure Relay Beamforming With Imperfect Channel Side Information , 2013, IEEE Transactions on Vehicular Technology.

[75]  Trung Quang Duong,et al.  Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.

[76]  Yongming Huang,et al.  Energy-Efficient Precoder Design for MIMO Wiretap Channels , 2014, IEEE Communications Letters.

[77]  Symeon Chatzinotas,et al.  Multicast Multigroup Precoding and User Scheduling for Frame-Based Satellite Communications , 2014, IEEE Transactions on Wireless Communications.

[78]  Zhiguo Ding,et al.  Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.

[79]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[80]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[81]  Taewon Hwang,et al.  A Game With Randomly Distributed Eavesdroppers in Wireless Ad Hoc Networks: A Secrecy EE Perspective , 2017, IEEE Transactions on Vehicular Technology.

[82]  Inkyu Lee,et al.  Outage Constrained Robust Beamforming for Secure Broadcasting Systems With Energy Harvesting , 2016, IEEE Transactions on Wireless Communications.

[83]  Chau Yuen,et al.  Physical Layer Security of TAS/MRC With Antenna Correlation , 2013, IEEE Transactions on Information Forensics and Security.

[84]  Adeel Razi,et al.  Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.

[85]  Andrea J. Goldsmith,et al.  Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networks , 2004, IEEE Journal on Selected Areas in Communications.

[86]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[87]  Huiming Wang,et al.  Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.

[88]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[89]  Zhiguo Ding,et al.  A General Relaying Transmission Protocol for MIMO Secrecy Communications , 2012, IEEE Transactions on Communications.

[90]  Huiming Wang,et al.  Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.

[91]  C.-C. Jay Kuo,et al.  Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.

[92]  Ananthanarayanan Chockalingam,et al.  Decode-and-Forward Relay Beamforming for Secrecy with Finite-Alphabet Input , 2013, IEEE Communications Letters.

[93]  Tao Liu,et al.  Toward Green and Secure Communications over Massive MIMO Relay Networks: Joint Source and Relay Power Allocation , 2017, IEEE Access.

[94]  Amitav Mukherjee,et al.  Imbalanced Beamforming by a Multi-Antenna Source for Secure Utilization of an Untrusted Relay , 2013, IEEE Communications Letters.

[95]  Tao Liu,et al.  Energy-efficient power allocation for secure communications in large-scale MIMO relaying systems , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).

[96]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[97]  Liang Liu,et al.  Secrecy wireless information and power transfer in fading wiretap channel , 2014, 2014 IEEE International Conference on Communications (ICC).

[98]  Markku J. Juntti,et al.  Antenna Selection With Erroneous Covariance Matrices Under Secrecy Constraints , 2016, IEEE Transactions on Vehicular Technology.

[99]  Geoffrey Ye Li,et al.  A survey of energy-efficient wireless communications , 2013, IEEE Communications Surveys & Tutorials.

[100]  Matti Latva-aho,et al.  Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter , 2015, IEEE Access.

[101]  Xiang Zhang,et al.  Partner Selection and Incentive Mechanism for Physical Layer Security , 2015, IEEE Transactions on Wireless Communications.

[102]  Donald F. Towsley,et al.  Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.

[103]  Saeedeh Parsaeefard,et al.  Secure Robust Ergodic Uplink Resource Allocation in Relay-Assisted Cognitive Radio Networks , 2015, IEEE Transactions on Signal Processing.

[104]  Kai-Kit Wong,et al.  A Closed-Form Power Allocation for Minimizing Secrecy Outage Probability for MISO Wiretap Channels via Masked Beamforming , 2012, IEEE Communications Letters.

[105]  Il-Min Kim,et al.  Optimal Cooperative Jamming for Multiuser Broadcast Channel with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[106]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[107]  W. Luo,et al.  User selection and resource allocation for secure multiuser MISO-OFDMA systems , 2011 .

[108]  Derrick Wing Kwan Ng,et al.  Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH Circuit , 2017, IEEE Transactions on Communications.

[109]  A. Lee Swindlehurst,et al.  MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design , 2011, IEEE Transactions on Information Forensics and Security.

[110]  Derrick Wing Kwan Ng,et al.  Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.

[111]  Bhaskar D. Rao,et al.  Training-based and semiblind channel estimation for MIMO systems with maximum ratio transmission , 2006, IEEE Transactions on Signal Processing.

[112]  Kostas Berberidis,et al.  Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink , 2015, IEEE Transactions on Information Forensics and Security.

[113]  Jong-Ho Lee,et al.  Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.

[114]  Tao Zhang,et al.  Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation , 2016, IEEE Transactions on Wireless Communications.

[115]  A. Lee Swindlehurst,et al.  Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.

[116]  Chenxi Liu,et al.  Location-Based Beamforming and Physical Layer Security in Rician Wiretap Channels , 2016, IEEE Transactions on Wireless Communications.

[117]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[118]  Il-Min Kim,et al.  Joint Design of Optimal Cooperative Jamming and Power Allocation for Linear Precoding , 2014, IEEE Transactions on Communications.

[119]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[120]  Yueming Cai,et al.  Energy-efficient optimization for physical layer security in large-scale random CRNs , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[121]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[122]  Trung Quang Duong,et al.  Opportunistic secure transmission for wireless relay networks with modify-and-forward protocol , 2017, 2017 IEEE International Conference on Communications (ICC).

[123]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[124]  A. Lee Swindlehurst,et al.  Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[125]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[126]  Elza Erkip,et al.  Diversity-multiplexing tradeoff for the multiple-antenna wire-tap channel , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[127]  Jing Huang,et al.  Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.

[128]  Feng Liu,et al.  Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks , 2014, IEEE Transactions on Information Forensics and Security.

[129]  Yuanyuan Yang,et al.  An Optimization Framework of Target Secrecy Rate and Power Allocation for SWIPT System , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[130]  Caijun Zhong,et al.  Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks , 2015, IEEE Transactions on Communications.

[131]  Kathrin Klamroth,et al.  Biconvex sets and optimization with biconvex functions: a survey and extensions , 2007, Math. Methods Oper. Res..

[132]  Björn E. Ottersten,et al.  Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering , 2015, IEEE Transactions on Wireless Communications.

[133]  Shuai Ma,et al.  Outage Constrained Robust Secure Transmission for MISO Wiretap Channels , 2013, IEEE Transactions on Wireless Communications.

[134]  Yaming Wang,et al.  Secure Beamforming for MIMO Broadcasting With Wireless Information and Power Transfer , 2014, IEEE Transactions on Wireless Communications.

[135]  Andrew R. Conn,et al.  Nonlinear programming via an exact penalty function: Asymptotic analysis , 1982, Math. Program..

[136]  Amir Beck,et al.  A sequential parametric convex approximation method with applications to nonconvex truss topology design problems , 2010, J. Glob. Optim..

[137]  Meixia Tao,et al.  Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.

[138]  George K. Karagiannidis,et al.  Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks , 2014, IEEE Transactions on Communications.

[139]  Xuelong Li,et al.  Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.

[140]  Hui Yu,et al.  Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks , 2015, IEEE Transactions on Information Forensics and Security.

[141]  Derrick Wing Kwan Ng,et al.  Energy-efficient resource allocation in multi-cell OFDMA systems with limited backhaul capacity , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[142]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[143]  Jianhua Ge,et al.  Joint Cooperative Beamforming and Artificial Noise Design for Secrecy Sum Rate Maximization in Two-Way AF Relay Networks , 2014, IEEE Communications Letters.

[144]  A. Lee Swindlehurst,et al.  On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels with Opportunistic Scheduling , 2014, IEEE Communications Letters.

[145]  Sumei Sun,et al.  Power Efficient Resource Allocation for Downlink OFDMA Relay Cellular Networks , 2012, IEEE Transactions on Signal Processing.

[146]  Xiaofeng Tao,et al.  Secrecy Outage on Transmit Antenna Selection With Weighting Errors at Maximal-Ratio Combiners , 2015, IEEE Communications Letters.

[147]  Haji M. Furqan,et al.  Enhancing the Security Performance of OSTBC Using Pre-Equalicodization , 2017, 2017 International Conference on Frontiers of Information Technology (FIT).

[148]  Sennur Ulukus,et al.  Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.

[149]  Eduard A. Jorswieck,et al.  Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.

[150]  Zhi Chen,et al.  Robust energy-efficient transmit design for misome wiretap channels , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[151]  Shi Jin,et al.  On the Secure Spectral-Energy Efficiency Tradeoff in Random Cognitive Radio Networks , 2016, IEEE Journal on Selected Areas in Communications.

[152]  Wenbo Wang,et al.  Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems , 2013, IEEE Transactions on Information Forensics and Security.

[153]  Inkyu Lee,et al.  Secrecy Outage Minimization for Wireless Powered Communication Networks with an Energy Harvesting Jammer , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[154]  I. Stancu-Minasian Nonlinear Fractional Programming , 1997 .

[155]  Yongming Huang,et al.  Cooperative Precoding for Wireless Energy Transfer and Secure Cognitive Radio Coexistence Systems , 2017, IEEE Signal Processing Letters.

[156]  Derrick Wing Kwan Ng,et al.  Resource allocation for secure communication in systems with wireless information and power transfer , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[157]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[158]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[159]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[160]  Matti Latva-aho,et al.  Secrecy Analysis of Transmit Antenna Selection Cooperative Schemes With No Channel State Information at the Transmitter , 2015, IEEE Transactions on Communications.

[161]  H. Vincent Poor,et al.  Cooperative Transmission for Relay Networks Based on Second-Order Statistics of Channel State Information , 2010, IEEE Transactions on Signal Processing.

[162]  Ruoheng Liu,et al.  Securing Wireless Communications at the Physical Layer , 2014 .

[163]  Fengchao Zhu,et al.  Improving Physical-Layer Security for CRNs Using SINR-Based Cooperative Beamforming , 2016, IEEE Transactions on Vehicular Technology.

[164]  Bo Wang,et al.  Secrecy Rate Maximization With Artificial-Noise-Aided Beamforming for MISO Wiretap Channels Under Secrecy Outage Constraint , 2015, IEEE Communications Letters.

[165]  Richard Demo Souza,et al.  On the Secure Energy Efficiency of TAS/MRC With Relaying and Jamming Strategies , 2017, IEEE Signal Processing Letters.

[166]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[167]  Mokhtar S. Bazaraa,et al.  Nonlinear Programming: Theory and Algorithms , 1993 .

[168]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.

[169]  Pingzhi Fan,et al.  Asymptotic Studies for the Impact of Antenna Selection on Secure Two-Way Relaying Communications with Artificial Noise , 2014, IEEE Transactions on Wireless Communications.

[170]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[171]  Derrick Wing Kwan Ng,et al.  Joint Beamforming and Power Allocation for Secrecy in Peer-to-Peer Relay Networks , 2015, IEEE Transactions on Wireless Communications.

[172]  Lie-Liang Yang,et al.  Transmitter Precoding-Aided Spatial Modulation for Secrecy Communications , 2016, IEEE Transactions on Vehicular Technology.

[173]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[174]  Shlomo Shamai,et al.  Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[175]  John S. Thompson,et al.  Power allocation for cooperative-based jamming in wireless networks with secrecy constraints , 2010, 2010 IEEE Globecom Workshops.

[176]  Mérouane Debbah,et al.  Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[177]  Y. Nesterov Semidefinite relaxation and nonconvex quadratic optimization , 1998 .

[178]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[179]  Jehad M. Hamamreh,et al.  OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.

[180]  Yu Gong,et al.  Dual Antenna Selection in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.

[181]  Xiaoming Chen,et al.  Optimal Power Allocation for a Massive MIMO Relay Aided Secure Communication , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[182]  Leonard J. Cimini,et al.  Antenna Selection for Energy-Efficient MIMO Transmission , 2012, IEEE Wireless Communications Letters.

[183]  Mikael Skoglund,et al.  Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints , 2015, IEEE Wireless Communications Letters.

[184]  Muhammad Fainan Hanif,et al.  Efficient Algorithm for Selecting Secrecy Rate Maximizing Antennas , 2013, IEEE Communications Letters.

[185]  Zhu Han,et al.  Secure Satellite Communication Systems Design With Individual Secrecy Rate Constraints , 2011, IEEE Transactions on Information Forensics and Security.

[186]  Huiming Wang,et al.  Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.

[187]  Yueming Cai,et al.  Robust secure switching transmission in multi-antenna relaying systems: cooperative jamming or decode-and-forward beamforming , 2016, IET Commun..

[188]  Hsueh-Jyh Li,et al.  Effect of Feedback Delay on Secure Cooperative Networks with Joint Relay and Jammer Selection , 2013, IEEE Wireless Communications Letters.

[189]  A. Lee Swindlehurst,et al.  Dirty Paper Coding versus Linear GSVD-Based Precoding in MIMO Broadcast Channel with Confidential Messages , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[190]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[191]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[192]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[193]  Peng Ning,et al.  The security of link signature: A view from channel models , 2014, 2014 IEEE Conference on Communications and Network Security.

[194]  Jing Yang,et al.  Transmission with Energy Harvesting Nodes in Fading Wireless Channels: Optimal Policies , 2011, IEEE Journal on Selected Areas in Communications.

[195]  Christian Fager,et al.  On the impact of hardware impairments on massive MIMO , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[196]  Il-Min Kim,et al.  Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.

[197]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[198]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.

[199]  Geoffrey Ye Li,et al.  Utility-based resource allocation and scheduling in OFDM-based wireless broadband networks , 2005, IEEE Commun. Mag..

[200]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[201]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[202]  Kai-Kit Wong,et al.  Secrecy and Energy Efficiency in Massive MIMO Aided Heterogeneous C-RAN: A New Look at Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[203]  Daniel Pérez Palomar,et al.  Rank-Constrained Separable Semidefinite Programming With Applications to Optimal Beamforming , 2010, IEEE Transactions on Signal Processing.

[204]  Meng Zhang,et al.  Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.

[205]  Wei-Ping Zhu,et al.  Energy efficient optimization for physical layer security in cognitive relay networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[206]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[207]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[208]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[209]  Mohamed-Slim Alouini,et al.  On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.

[210]  Zhu Han,et al.  Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy , 2017, IEEE Transactions on Wireless Communications.

[211]  Mohamed-Slim Alouini,et al.  On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.

[212]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[213]  Derrick Wing Kwan Ng,et al.  Resource Allocation for a Massive MIMO Relay Aided Secure Communication , 2016, IEEE Transactions on Information Forensics and Security.

[214]  Yongming Huang,et al.  Secrecy Performance of Transmit Antenna Selection for MIMO Relay Systems With Outdated CSI , 2018, IEEE Transactions on Communications.

[215]  Ya-Feng Liu,et al.  Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.

[216]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[217]  Suhas N. Diggavi,et al.  Great expectations: the value of spatial diversity in wireless networks , 2004, Proceedings of the IEEE.

[218]  Jehad M. Hamamreh,et al.  On physical-layer concepts and metrics in secure signal transmission , 2017, Phys. Commun..

[219]  Markku J. Juntti,et al.  On Linear Precoding Strategies for Secrecy Rate Maximization in Multiuser Multiantenna Wireless Networks , 2014, IEEE Transactions on Signal Processing.

[220]  Jae-Mo Kang,et al.  Joint Design of Optimal Precoding and Cooperative Jamming for Multiuser Secure Broadcast Systems , 2017, IEEE Transactions on Vehicular Technology.

[221]  H. Vincent Poor,et al.  Power Allocation for Artificial-Noise Secure MIMO Precoding Systems , 2014, IEEE Transactions on Signal Processing.

[222]  A. Lee Swindlehurst,et al.  Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.

[223]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.

[224]  Derrick Wing Kwan Ng,et al.  Power efficient and secure multiuser communication systems with wireless information and power transfer , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[225]  Eduard A. Jorswieck,et al.  Energy Efficiency of Confidential Multi-Antenna Systems With Artificial Noise and Statistical CSI , 2016, IEEE Journal of Selected Topics in Signal Processing.

[226]  H. Vincent Poor,et al.  Outage capacity and partial secrecy for energy efficient physical layer security in Gaussian fading channels , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).

[227]  Yongming Huang,et al.  Secure Beamforming Design for SWIPT in MISO Broadcast Channel With Confidential Messages and External Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.

[228]  Zhu Han,et al.  Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.

[229]  Tiejun Lv,et al.  Secrecy Transmit Beamforming for Heterogeneous Networks , 2015, IEEE Journal on Selected Areas in Communications.

[230]  Inkyu Lee,et al.  Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer , 2017, IEEE Transactions on Communications.

[231]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[232]  Zhi Chen,et al.  Artificial Noise Aided Energy Efficiency Optimization in MIMOME System With SWIPT , 2017, IEEE Communications Letters.

[233]  Costas N. Georghiades,et al.  Secrecy Capacity per Unit Cost , 2013, IEEE Journal on Selected Areas in Communications.

[234]  Vincent K. N. Lau,et al.  On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.

[235]  Ness B. Shroff,et al.  Secrecy outage capacity of fading channels , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).

[236]  Kamel Tourki,et al.  AN-Aided Relay-Selection Scheme for Securing Untrusted RF-EH Relay Systems , 2017, IEEE Transactions on Green Communications and Networking.

[237]  Le Thi Hoai An,et al.  A new efficient algorithm based on DC programming and DCA for clustering , 2007, J. Glob. Optim..

[238]  Aylin Yener,et al.  The role of an untrusted relay in secret communication , 2008, 2008 IEEE International Symposium on Information Theory.

[239]  Eduard A. Jorswieck,et al.  Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward , 2014, IEEE Transactions on Information Forensics and Security.

[240]  Zhi Ding,et al.  On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback , 2011, IEEE Transactions on Wireless Communications.

[241]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.

[242]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[243]  Donald C. Cox,et al.  Correlation analysis based on MIMO channel measurements in an indoor environment , 2003, IEEE J. Sel. Areas Commun..

[244]  Sennur Ulukus,et al.  Secure broadcasting using multiple antennas , 2010, Journal of Communications and Networks.

[245]  Jinho Choi,et al.  Transmit power minimization beamforming via amplify-and-forward relays in wireless networks with multiple eavesdroppers , 2014, 2014 IEEE International Conference on Communications (ICC).

[246]  Julio López,et al.  Application of the sequential parametric convex approximation method to the design of robust trusses , 2017, J. Glob. Optim..

[247]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[248]  Trung Q. Duong,et al.  Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer , 2017, IEEE Wireless Communications Letters.

[249]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[250]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[251]  Mohsen Guizani,et al.  Joint physical-application layer security for wireless multimedia delivery , 2014, IEEE Communications Magazine.

[252]  Hlaing Minn,et al.  Hybrid Analog–Digital Precoding Design for Secrecy mmWave MISO-OFDM Systems , 2017, IEEE Transactions on Communications.

[253]  Derrick Wing Kwan Ng,et al.  Multiobjective Resource Allocation for Secure Communication in Cognitive Radio Networks With Wireless Information and Power Transfer , 2016, IEEE Transactions on Vehicular Technology.

[254]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[255]  Liang Zhong,et al.  Iterative Distributed Minimum Total MSE Approach for Secure Communications in MIMO Interference Channels , 2016, IEEE Transactions on Information Forensics and Security.

[256]  Xiangyun Zhou,et al.  On the placement of RF energy harvesting node in wireless networks with secrecy considerations , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[257]  Chau Yuen,et al.  Energy Efficiency Tradeoff Mechanism Towards Wireless Green Communication: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[258]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[259]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[260]  Symeon Chatzinotas,et al.  Distributed Optimization for Coordinated Beamforming in Multicell Multigroup Multicast Systems: Power Minimization and SINR Balancing , 2017, IEEE Transactions on Signal Processing.

[261]  Trung Quang Duong,et al.  Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection With Outdated CSI , 2015, IEEE Transactions on Communications.

[262]  Alessio Zappone,et al.  Optimal Energy-Efficient Design of Confidential Multiple-Antenna Systems , 2018, IEEE Transactions on Information Forensics and Security.

[263]  Jing Huang,et al.  Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.

[264]  Shihao Yan,et al.  Location-Based Beamforming for Enhancing Secrecy in Rician Wiretap Channels , 2016, IEEE Transactions on Wireless Communications.

[265]  Ha H. Nguyen,et al.  Joint Optimization of Source Power Allocation and Cooperative Beamforming for SC-FDMA Multi-User Multi-Relay Networks , 2013, IEEE Transactions on Communications.

[266]  Yuan-Pei Lin,et al.  Secure Transmission Using MIMO Precoding , 2014, IEEE Transactions on Information Forensics and Security.

[267]  Ranjan Bose,et al.  Resource Allocation for Secure Multicarrier AF Relay System Under Total Power Constraint , 2015, IEEE Communications Letters.

[268]  Xiaoming Chen,et al.  Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks with QoS Guarantee , 2013, IEEE Communications Letters.

[269]  Shuzhong Zhang,et al.  New results on Hermitian matrix rank-one decomposition , 2011, Math. Program..

[270]  A. Lee Swindlehurst,et al.  User selection in multiuser MIMO systems with secrecy considerations , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[271]  Kwok Hung Li,et al.  Generalized Relay Selection for Improved Security in Cooperative DF Relay Networks , 2016, IEEE Wireless Communications Letters.

[272]  Xiangyun Zhou,et al.  Base Station Cooperation for Confidential Broadcasting in Multi-Cell Networks , 2015, IEEE Transactions on Wireless Communications.

[273]  Andrea J. Goldsmith,et al.  Capacity limits of MIMO channels , 2003, IEEE J. Sel. Areas Commun..

[274]  Jinhong Yuan,et al.  Confidential Broadcasting via Linear Precoding in Non-Homogeneous MIMO Multiuser Networks , 2014, IEEE Transactions on Communications.

[275]  Robert Schober,et al.  Combined relay selection and cooperative beamforming for physical layer security , 2012, Journal of Communications and Networks.

[276]  Muhammad R. A. Khandaker,et al.  Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.

[277]  Fan Wu,et al.  Cross-Layer Scheduling for OFDMA-Based Cognitive Radio Systems With Delay and Security Constraints , 2015, IEEE Transactions on Vehicular Technology.

[278]  Derrick Wing Kwan Ng,et al.  Multi-objective beamforming for secure communication in systems with wireless information and power transfer , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[279]  Huiming Wang,et al.  Opportunistic Jamming for Enhancing Security: Stochastic Geometry Modeling and Analysis , 2016, IEEE Transactions on Vehicular Technology.

[280]  A. Lee Swindlehurst,et al.  Joint transmit design and node selection for one-way and two-way untrusted relay channels , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[281]  Marwan Krunz,et al.  Exploiting Full-Duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks , 2016, IEEE Transactions on Communications.

[282]  Derrick Wing Kwan Ng,et al.  Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.

[283]  Wei-Ping Zhu,et al.  Energy efficient beamforming for secure communication in cognitive radio networks , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).