Journal ArticleDOI
A Survey on Multiple-Antenna Techniques for Physical Layer Security
Reads0
Chats0
TLDR
A detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks is provided.Abstract:
As a complement to high-layer encryption techniques, physical layer security has been widely recognized as a promising way to enhance wireless security by exploiting the characteristics of wireless channels, including fading, noise, and interference. In order to enhance the received signal power at legitimate receivers and impair the received signal quality at eavesdroppers simultaneously, multiple-antenna techniques have been proposed for physical layer security to improve secrecy performance via exploiting spatial degrees of freedom. This paper provides a comprehensive survey on various multiple-antenna techniques in physical layer security, with an emphasis on transmit beamforming designs for multiple-antenna nodes. Specifically, we provide a detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks. Finally, future research directions and challenges are identified.read more
Citations
More filters
Journal ArticleDOI
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
TL;DR: This paper provides a latest survey of the physical layer security research on various promising 5G technologies, includingPhysical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, and so on.
Journal ArticleDOI
Robust and Secure Wireless Communications via Intelligent Reflecting Surfaces
TL;DR: In this article, the authors investigated the joint design of the beamformers and AN covariance matrix at the AP and the phase shifters at the RISs for maximization of the system sum-rate while limiting the maximum information leakage to the potential eavesdroppers.
Journal ArticleDOI
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
TL;DR: A conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping is proposed, and the security techniques that are reviewed are divided into two primary approaches: signal-to-interference-plus-noise ratio- based approach and complexity-based approach.
Journal ArticleDOI
Massive Access for 5G and Beyond
TL;DR: In this article, a comprehensive survey of massive access design for B5G wireless networks is presented, from the perspectives of theory, protocols, techniques, coverage, energy, and security.
Journal ArticleDOI
Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT
TL;DR: In this paper, an artificial-noise-aided cooperative jamming scheme is proposed to improve the security of the primary network in a multiple-input single-output (MISO) NOMA CR network.
References
More filters
Journal ArticleDOI
Cognitive radio: brain-empowered wireless communications
TL;DR: Following the discussion of interference temperature as a new metric for the quantification and management of interference, the paper addresses three fundamental cognitive tasks: radio-scene analysis, channel-state estimation and predictive modeling, and the emergent behavior of cognitive radio.
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Journal ArticleDOI
The wire-tap channel
TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI
Broadcast channels with confidential messages
Imre Csiszár,János Körner +1 more
TL;DR: Given two discrete memoryless channels (DMC's) with a common input, a single-letter characterization is given of the achievable triples where R_{e} is the equivocation rate and the related source-channel matching problem is settled.
Journal ArticleDOI
A Survey of Dynamic Spectrum Access
Qing Zhao,Brian M. Sadler +1 more
TL;DR: An overview of challenges and recent developments in both technological and regulatory aspects of opportunistic spectrum access (OSA) is presented, and the three basic components of OSA are discussed.