Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges
Citations
457 citations
Cites background from "Physical Layer Security for Next Ge..."
...More precisely, in most of the available well-known PLS surveys such as [4], [5], [7],...
[...]
215 citations
Cites background from "Physical Layer Security for Next Ge..."
...Therefore, there are many surveys and magazine articles [20], [131], [133]–[135] that cover various aspects of physical layer security....
[...]
207 citations
207 citations
Cites methods from "Physical Layer Security for Next Ge..."
...For instance, practical coding techniques for PLS and their performance metrics are mostly unknown [21]....
[...]
175 citations
Cites background from "Physical Layer Security for Next Ge..."
...These approaches aim at degrading the quality of signal reception at eavesdroppers compared to the main channel and thereby preventing them from decoding the confidential information from the intercepted signals [26]– [29]....
[...]
References
8,777 citations
"Physical Layer Security for Next Ge..." refers background in this paper
...Shannon’s information theoretic secrecy analysis [3], which defined that security level depends on the amount of information known by eavesdroppers....
[...]
...Shannon [3] proved that proper channel coding achieves reliability....
[...]
8,084 citations
[...]
7,129 citations
"Physical Layer Security for Next Ge..." refers background or methods in this paper
...Wyner [4] implied that the intrinsic elements of physical channels, such as noises and interferences, play central roles in secure communications....
[...]
...The confidential communications can achieve a maximum message transmission rate using wiretap channel coding, whose rate is defined as the secrecy capacity by Wyner [4]....
[...]
...In 1975, Wyner [4] introduced a discrete memoryless wiretap channel model....
[...]
...This description on security is related closely to the communications in the presence of noise, so that the concepts of entropy and equivocation developed for communication problems have a direct inspiration in the early investigations on PHY-security [4]–[8]....
[...]
6,708 citations
"Physical Layer Security for Next Ge..." refers background in this paper
...ation wireless networks is to explore unused high frequency mm-wave band, ranging from 3∼300 GHz [204]....
[...]
5,158 citations
"Physical Layer Security for Next Ge..." refers background in this paper
...1) Massive MIMO: Massive MIMO systems have an enormous number of antennas, which offer more degrees of freedom for wireless channels, and a better performance in terms of channel capacities or link reliability [199]....
[...]