4.2 Article

Survey on physical layer security for 5G wireless networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

A Product Channel Attack to Wireless Physical Layer Security

Gonzalo J. Anaya-Lopez et al.

Summary: The proposed attack compromises physical layer security in wireless systems by transmitting slowly-varying random symbols to increase the fading severity observed at the base station, leading to transmission to Bob at a rate larger than the secrecy capacity. Using multiple antennas at the base station may partially alleviate but not immunize against these attacks.

IEEE WIRELESS COMMUNICATIONS LETTERS (2021)

Article Engineering, Electrical & Electronic

Information-Theoretic Security of MIMO Networks Under κ-μ Shadowed Fading Channels

Jose David Vega Sanchez et al.

Summary: This paper investigates the impact of realistic propagation conditions on the achievable secrecy performance of multiple-input multiple-output systems. It focuses on the kappa-mu shadowed fading model and considers transmit antenna selection and reception strategies at both legitimate and eavesdropper receivers. Novel closed-form expressions for secrecy performance metrics are derived and analytical asymptotic expressions are provided in the high signal-to-noise ratio regime.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Engineering, Electrical & Electronic

Physical layer authentication under intelligent spoofing in wireless sensor networks

Ning Gao et al.

SIGNAL PROCESSING (2020)

Article Telecommunications

On the statistics of the ratio of nonconstrained arbitrary α-μ random variables: A general framework and applications

Jose David Vega Sanchez et al.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2020)

Article Engineering, Electrical & Electronic

Physical-Layer Security in the Finite Blocklength Regime Over Fading Channels

Tong-Xing Zheng et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Ambient Backscatter: A Novel Method to Defend Jamming Attacks for Wireless Networks

Nguyen Van Huynh et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2020)

Article Computer Science, Information Systems

Testbed for Cooperative Jamming Cancellation in Physical Layer Security

Wenbo Guo et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2020)

Article Engineering, Electrical & Electronic

On The Secrecy Performance Over N-Wave With Diffuse Power Fading Channel

Jose David Vega Sanchez et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Theory & Methods

On the Secrecy Performance and Power Allocation in Relaying Networks With Untrusted Relay in the Partial Secrecy Regime

Diana Pamela Moya Osorio et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Information Systems

Jamming-Aided Secrecy Performance in Secure Uplink NOMA System

Kaiwei Jiang et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks

Holger Boche et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security

Furqan Jameel et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Engineering, Electrical & Electronic

Wireless Security Employing Opportunistic Relays and an Adaptive Encoder Under Outdated CSI and Dual-Correlated Nakagami-m Fading

Khoa N. Le et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2019)

Article Computer Science, Hardware & Architecture

MILLIMETER-WAVE PROPAGATION MODELING AND MEASUREMENTS FOR 5G MOBILE NETWORKS

Zhijian Lin et al.

IEEE WIRELESS COMMUNICATIONS (2019)

Article Engineering, Electrical & Electronic

Secrecy outage analysis over fluctuating two-ray fading channels

Hui Zhao et al.

ELECTRONICS LETTERS (2019)

Article Telecommunications

Secrecy Analysis in SWIPT Systems Over Generalized-K Fading Channels

Zhijie Wang et al.

IEEE COMMUNICATIONS LETTERS (2019)

Article Computer Science, Theory & Methods

Vulnerabilities of Massive MIMO Systems to Pilot Contamination Attacks

Berk Akgun et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

Secure Communication in Relay-Assisted Massive MIMO Downlink With Active Pilot Attacks

Dhanushka Kudathanthirige et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Engineering, Electrical & Electronic

Rank-Based Secrecy Rate Improvement Using NOMA for Ultra Dense Network

Garima Chopra et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Engineering, Electrical & Electronic

Transmit Beamforming for Layered Physical Layer Security

Wei Zhang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Hardware & Architecture

Physical Layer Security for the Internet of Things: Authentication and Key Generation

Junqing Zhang et al.

IEEE WIRELESS COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Secure Transmission in Multi-Cell Multi-User Massive MIMO Systems With an Active Eavesdropper

Die Hu et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2019)

Article Computer Science, Information Systems

Physical Layer Security in Uplink NOMA Multi-Antenna Systems Randomly Distributed Eavesdroppers

Gerardo Gomez et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Secure Transmission for Downlink NOMA Visible Light Communication Networks

Chun Du et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey

Jehad M. Hamamreh et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Proceedings Paper Computer Science, Artificial Intelligence

An Overview of Methods of Reducing the Effect of Jamming Attacks at the Physical Layer of Wireless Networks

Dimitriya Mihaylova

FUTURE ACCESS ENABLERS FOR UBIQUITOUS AND INTELLIGENT INFRASTRUCTURES, FABULOUS 2019 (2019)

Proceedings Paper Computer Science, Theory & Methods

Randomized Positioning DSSS with Message Shuffling for Anti-Jamming Wireless Communications

Ahmad Alagil et al.

2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC) (2019)

Article Computer Science, Information Systems

Ratio of Two Envelopes Taken From α-μ, η-μ, and κ-μ Variates and Some Practical Applications

Carlos Rafael Nogueira Da Silva et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Game-Theoretic Learning Approaches for Secure D2D Communications Against Full-Duplex Active Eavesdropper

Yijie Luo et al.

IEEE ACCESS (2019)

Article Telecommunications

Secrecy Outage Analysis Over Correlated Composite Nakagami-m/Gamma Fading Channels

George C. Alexandropoulos et al.

IEEE COMMUNICATIONS LETTERS (2018)

Article Telecommunications

Physical Layer Security in Multi-Hop AF Relay Network Based on Compressed Sensing

Lyu Qing et al.

IEEE COMMUNICATIONS LETTERS (2018)

Article Engineering, Electrical & Electronic

Robust Beamforming for Physical Layer Security in BDMA Massive MIMO

Fengchao Zhu et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Secure Massive MIMO With the Artificial Noise-Aided Downlink Training

Nam-Phong Nguyen et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Computer Science, Information Systems

5G D2D Networks: Techniques, Challenges, and Future Prospects

Rafay Iqbal Ansari et al.

IEEE SYSTEMS JOURNAL (2018)

Article Engineering, Electrical & Electronic

Secrecy Performance of Transmit Antenna Selection for MIMO Relay Systems With Outdated CSI

Rui Zhao et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

On the Achievable Secrecy Diversity of Cooperative Networks With Untrusted Relays

Mohaned Chraiti et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

On the Physical Layer Security Analysis of Hybrid Millimeter Wave Networks

Satyanarayana Vuppala et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Secure Transmission With Guaranteed User Satisfaction in Heterogeneous Networks: A Two-Level Stackelberg Game Approach

Nanmiao Wu et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Full-Duplex Small-Cell Networks: A Physical-Layer Security Perspective

Ayda Bahaei et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2018)

Article Computer Science, Theory & Methods

Secret Channel Training to Enhance Physical Layer Security With a Full-Duplex Receiver

Shihao Yan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Engineering, Electrical & Electronic

Physical Layer Security Over Fluctuating Two-Ray Fading Channels

Wen Zeng et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

Beam Domain Secure Transmission for Massive MIMO Communications

Wenqian Wu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

Three Artificial-Noise-Aided Secure Transmission Schemes in Wiretap Channels

Shihao Yan et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

Safeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers

Ying Ju et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Cache-Enabled Physical Layer Security for Video Streaming in Backhaul-Limited Cellular Networks

Lin Xiang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Secure Video Streaming in Heterogeneous Small Cell Networks With Untrusted Cache Helpers

Lin Xiang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints

Marcos Eduardo Pivaro Monteiro et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Computer Science, Information Systems

SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels

Kaiwei Jiang et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Secrecy Rate Optimization in Wireless Multi-Hop Full Duplex Networks

Feng Tian et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

On Physical Layer Security Over the Fisher-Snedecor F Wiretap Fading Channels

Long Kong et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Physical Layer Security in 5G Based Large Scale Social Networks: Opportunities and Challenges

Yuan Gao et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Physical-Layer Security Against Smart Eavesdroppers: Exploiting Full-Duplex Receivers

Jongyeop Kim et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Optimal Power and Rate Allocation in Superposition Transmission With Successive Noise Signal Sharing Toward Zero Intercept Probability

Yunsung Choi et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2018)

Article Telecommunications

On Physical Layer Security of α-η-κ-μ Fading Channels

Aashish Mathur et al.

IEEE COMMUNICATIONS LETTERS (2018)

Article Engineering, Electrical & Electronic

Physical Layer Security in Heterogeneous Networks With Pilot Attack: A Stochastic Geometry Approach

Wei Wang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Performance Analysis of Secure Communications Over Dual Correlated Rician Fading Channels

Khoa N. Le

IEEE TRANSACTIONS ON COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Secrecy Performance of Untrusted Relay Systems With a Full-Duplex Jamming Destination

Rui Zhao et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Hardware & Architecture

ON THE SECRECY CAPACITY OF 5G MMWAVE SMALL CELL NETWORKS

Ke Xiao et al.

IEEE WIRELESS COMMUNICATIONS (2018)

Article Computer Science, Information Systems

Optimization for Maximizing Sum Secrecy Rate in SWIPT-Enabled NOMA Systems

Jie Tang et al.

IEEE ACCESS (2018)

Article Engineering, Electrical & Electronic

Secrecy Analysis of Random MIMO Wireless Networks Over α-μ Fading Channels

Long Kong et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

Security-Reliability Tradeoff for Distributed Antenna Systems in Heterogeneous Cellular Networks

Yulong Zou et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Adaptive Resource Allocation for Secure Two-Hop Relaying Communication

Khoa T. Phan et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Computer Science, Hardware & Architecture

STACKELBERG GAME APPROACHES FOR ANTI-JAMMING DEFENCE IN WIRELESS NETWORKS

Luliang Jia et al.

IEEE WIRELESS COMMUNICATIONS (2018)

Article Computer Science, Information Systems

Secure Performance Analysis for Multi-Pair AF Relaying Massive MIMO Systems in Ricean Channels

Xianyu Zhang et al.

IEEE ACCESS (2018)

Article Telecommunications

Secure Communication in Spectrum-Sharing Massive MIMO Systems With Active Eavesdropping

Santosh Timilsina et al.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2018)

Article Telecommunications

The Fisher-Snedecor F Distribution: A Simple and Accurate Composite Fading Model

Seong Ki Yoo et al.

IEEE COMMUNICATIONS LETTERS (2017)

Article Computer Science, Information Systems

Network Coding in Cognitive Radio Networks: A Comprehensive Survey

Ayesha Naeem et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Information Systems

Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges

Yiliang Liu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Engineering, Electrical & Electronic

5G: A Tutorial Overview of Standards, Trials, Challenges, Deployment, and Practice

Mansoor Shafi et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

On the Design of Secure Non-Orthogonal Multiple Access Systems

Biao He et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2017)

Editorial Material Engineering, Electrical & Electronic

What will 5G Antennas and Propagation Be?

Duixian Liu et al.

IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION (2017)

Article Computer Science, Theory & Methods

MIMO Secret Communications Against an Active Eavesdropper

Lingxiang Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Engineering, Electrical & Electronic

The Fluctuating Two-Ray Fading Model: Statistical Characterization and Performance Analysis

Juan M. Romero-Jerez et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

A New Metric for Measuring the Security of an Environment: The Secrecy Pressure

Lorenzo Mucchi et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

Analysis and Design of Secure Massive MIMO Systems in the Presence of Hardware Impairments

Jun Zhu et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Article Computer Science, Information Systems

Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks

Kanapathippillai Cumanan et al.

IEEE ACCESS (2017)

Proceedings Paper Engineering, Electrical & Electronic

Artificial-Noise-Aided Secure Communication with Full-Duplex Active Eavesdropper

Zunning Liu et al.

2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC) (2017)

Article Telecommunications

Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access

Yi Zhang et al.

IEEE COMMUNICATIONS LETTERS (2016)

Article Engineering, Electrical & Electronic

The α-η-κ-μ Fading Model

Michel Daoud Yacoub

IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION (2016)

Article Engineering, Electrical & Electronic

On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels

Biao He et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Review Engineering, Industrial

Jamming attacks on wireless networks: A taxonomic survey

Satish Vadlamani et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2016)

Article Computer Science, Information Systems

Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter

Hirley Alves et al.

IEEE ACCESS (2016)

Review Computer Science, Information Systems

Key Generation From Wireless Channels: A Review

Junqing Zhang et al.

IEEE ACCESS (2016)

Article Telecommunications

On Physical Layer Security Over Generalized Gamma Fading Channels

Hongjiang Lei et al.

IEEE COMMUNICATIONS LETTERS (2015)

Article Engineering, Electrical & Electronic

Safeguarding 5G Wireless Communication Networks Using Physical Layer Security

Nan Yang et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Engineering, Electrical & Electronic

Secrecy Transmit Beamforming for Heterogeneous Networks

Tiejun Lv et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2015)

Article Engineering, Electrical & Electronic

Optimization of Code Rates in SISOME Wiretap Channels

Shihao Yan et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2015)

Article Engineering, Electrical & Electronic

Statistical Characterization of κ-μ Shadowed Fading

Jose F. Paris

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2014)

Article Engineering, Electrical & Electronic

Secure Transmission in Multicell Massive MIMO Systems

Jun Zhu et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2014)

Article Computer Science, Information Systems

Jamming and anti-jamming techniques in wireless networks: a survey

Kanika Grover et al.

INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING (2014)

Article Computer Science, Theory & Methods

Secure On-Off Transmission Design With Channel Estimation Errors

Biao He et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Information Systems

Millimeter Wave Mobile Communications for 5G Cellular: It Will Work!

Theodore S. Rappaport et al.

IEEE ACCESS (2013)

Article Computer Science, Information Systems

Probability of Strictly Positive Secrecy Capacity of the Rician-Rician Fading Channel

Xian Liu

IEEE WIRELESS COMMUNICATIONS LETTERS (2013)

Article Engineering, Electrical & Electronic

Pilot Contamination for Active Eavesdropping

Xiangyun Zhou et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2012)

Article Telecommunications

Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective

Xiangyun Zhou et al.

IEEE COMMUNICATIONS LETTERS (2011)

Article Telecommunications

Maximal Ratio Diversity Combining Enhanced Security

Fangming He et al.

IEEE COMMUNICATIONS LETTERS (2011)

Article Computer Science, Theory & Methods

On Wireless Channels With M-Antenna Eavesdroppers: Characterization of the Outage Probability and ε-Outage Secrecy Capacity

Vinay Uday Prabhu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Engineering, Electrical & Electronic

Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI

Amitav Mukherjee et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2011)

Article Computer Science, Hardware & Architecture

ENHANCED INTERCELL INTERFERENCE COORDINATION CHALLENGES IN HETEROGENEOUS NETWORKS

David Lopez-Perez et al.

IEEE WIRELESS COMMUNICATIONS (2011)

Article Engineering, Electrical & Electronic

Improving Wireless Physical Layer Security via Cooperating Relays

Lun Dong et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2010)

Article Computer Science, Information Systems

Denial-of-service in wireless sencsor networks: Attacks and defenses

David R. Raymond et al.

IEEE PERVASIVE COMPUTING (2008)

Article Computer Science, Information Systems

Wireless information-theoretic security

Matthieu Bloch et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2008)

Article Computer Science, Information Systems

On the secrecy capacity of fading channels

Praveen Kumar Gopala et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2008)