-
1
-
-
85032752174
-
Scaling up MIMO: Opportunities and challenges with very large arrays
-
Jan.
-
F. Rusek et al., "Scaling up MIMO: Opportunities and challenges with very large arrays, " IEEE Signal Process. Mag., vol. 30, no. 1, pp. 40-46, Jan. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.1
, pp. 40-46
-
-
Rusek, F.1
-
2
-
-
84896823919
-
Massive MIMO for next generation wireless systems
-
Feb.
-
E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, "Massive MIMO for next generation wireless systems, " IEEE Commun. Mag., vol. 52, no. 2, pp. 186-195, Feb. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.2
, pp. 186-195
-
-
Larsson, E.G.1
Edfors, O.2
Tufvesson, F.3
Marzetta, T.L.4
-
3
-
-
84933037312
-
Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks
-
Jun.
-
D. Kapetanovic, G. Zheng, and F. Rusek, "Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks, " IEEE Commun. Mag., vol. 53, no. 6, pp. 21-27, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 21-27
-
-
Kapetanovic, D.1
Zheng, G.2
Rusek, F.3
-
4
-
-
84969998525
-
Secure massive MIMO transmission with an active eavesdropper
-
Jul.
-
Y. Wu, R. Schober, D. W. K. Ng, C. Xiao, and G. Caire, "Secure massive MIMO transmission with an active eavesdropper, " IEEE Trans. Inf. Theory., vol. 62, no. 7, pp. 3880-3900, Jul. 2016.
-
(2016)
IEEE Trans. Inf. Theory.
, vol.62
, Issue.7
, pp. 3880-3900
-
-
Wu, Y.1
Schober, R.2
Ng, D.W.K.3
Xiao, C.4
Caire, G.5
-
5
-
-
85038815092
-
Evaluating secrecy outage of physical layer security in large-scale MIMO wireless communications for cyber-physical systems
-
to be published
-
D. B. Rawat, T. White, M. S. Parwez, C. Bajracharya, and M. Song, "Evaluating secrecy outage of physical layer security in large-scale MIMO wireless communications for cyber-physical systems, " IEEE Internet Things J., to be published.
-
IEEE Internet Things J
-
-
Rawat, D.B.1
White, T.2
Parwez, M.S.3
Bajracharya, C.4
Song, M.5
-
6
-
-
67249087217
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming, " in Proc. IEEE Global Commun. Conf. (GLOBECOM), New Orleans, LA, USA, Dec. 2008, pp. 1-5.
-
(2008)
Proc. IEEE Global Commun. Conf. (GLOBECOM), New Orleans, LA, USA, Dec.
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
7
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
3rd Quart.
-
A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey, " IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, 3rd Quart., 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.A.A.2
Huang, J.3
Swindlehurst, A.L.4
-
8
-
-
85020456786
-
A survey on multiple-antenna techniques for physical layer security
-
2nd Quart.
-
X. Chen, D. W. K. Ng, W. H. Gerstacker, and H.-H. Chen, "A survey on multiple-antenna techniques for physical layer security, " IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp. 1027-1053, 2nd Quart., 2017.
-
(2017)
IEEE Commun. Surveys Tuts.
, vol.19
, Issue.2
, pp. 1027-1053
-
-
Chen, X.1
Ng, D.W.K.2
Gerstacker, W.H.3
Chen, H.-H.4
-
9
-
-
84904614329
-
Security versus reliability analysis of opportunistic relaying
-
Jul.
-
Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying, " IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.6
, pp. 2653-2661
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
Hanzo, L.4
-
10
-
-
84922896499
-
Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
-
Feb.
-
C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks, " IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.2
, pp. 589-605
-
-
Wang, C.1
Wang, H.-M.2
Xia, X.-G.3
-
11
-
-
84960131664
-
Artificial noise assisted secure transmission under training and feedback
-
Dec.
-
H.-M. Wang, C. Wang, and D. W. K. Ng, "Artificial noise assisted secure transmission under training and feedback, " IEEE Trans. Signal Process., vol. 63, no. 23, pp. 6285-6298, Dec. 2015.
-
(2015)
IEEE Trans. Signal Process.
, vol.63
, Issue.23
, pp. 6285-6298
-
-
Wang, H.-M.1
Wang, C.2
Ng, D.W.K.3
-
12
-
-
84891350212
-
Cooperative jamming protocols in two hop amplify-and-forward wiretap channels
-
D. Fang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Cooperative jamming protocols in two hop amplify-and-forward wiretap channels, " in Proc. IEEE Int. Conf. Commun. (ICC), Budapest, Hungary, Nov. 2013, pp. 2188-2192.
-
(2013)
Proc. IEEE Int. Conf. Commun. (ICC), Budapest, Hungary, Nov.
, pp. 2188-2192
-
-
Fang, D.1
Yang, N.2
Elkashlan, M.3
Yeoh, P.L.4
Yuan, J.5
-
13
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. S. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming, " IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.S.2
McLaughlin, S.3
-
14
-
-
84982305842
-
Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays
-
Aug.
-
L. Wang, Y. Cai, Y. Zou, W. Yang, and L. Hanzo, "Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays, " IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6259-6274, Aug. 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.8
, pp. 6259-6274
-
-
Wang, L.1
Cai, Y.2
Zou, Y.3
Yang, W.4
Hanzo, L.5
-
15
-
-
76649135514
-
Physical layer security game: Interaction between source, eavesdropper and friendly jammer
-
Mar.
-
Z. Han, N. Marina, M. Debbah, and A. Hjorungnes, "Physical layer security game: Interaction between source, eavesdropper and friendly jammer, " EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 452907-1-452907-10, Mar. 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, vol.2009
, pp. 4529071-45290710
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjorungnes, A.4
-
16
-
-
84874051560
-
Destination assisted cooperative jamming for wireless physical-layer security
-
Apr.
-
Y. Liu, J. Li, and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-694, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 682-694
-
-
Liu, Y.1
Li, J.2
Petropulu, A.P.3
-
17
-
-
78650858776
-
On the secure degrees of freedom of relaying with half-duplex feedback
-
Jan.
-
T. T. Kim and H. V. Poor, "On the secure degrees of freedom of relaying with half-duplex feedback, " IEEE Trans. Inf. Theory., vol. 57, no. 1, pp. 291-302, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Theory.
, vol.57
, Issue.1
, pp. 291-302
-
-
Kim, T.T.1
Poor, H.V.2
-
18
-
-
84937146871
-
Secure transmission for multiuser relay networks
-
Jul.
-
S. I. Kim, I. M. Kim, and J. Heo, "Secure transmission for multiuser relay networks, " IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3724-3737, Jul. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.7
, pp. 3724-3737
-
-
Kim, S.I.1
Kim, I.M.2
Heo, J.3
-
19
-
-
84903317482
-
Secure transmission with optimal power allocation in untrusted relay networks
-
Jun.
-
L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, "Secure transmission with optimal power allocation in untrusted relay networks, " IEEE Wireless Commun. Lett., vol. 3, no. 3, pp. 289-292, Jun. 2014.
-
(2014)
IEEE Wireless Commun. Lett.
, vol.3
, Issue.3
, pp. 289-292
-
-
Wang, L.1
Elkashlan, M.2
Huang, J.3
Tran, N.H.4
Duong, T.Q.5
-
20
-
-
84956860249
-
Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: Resource allocation and performance study
-
A. Kuhestani and A. Mohammadi, "Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: Resource allocation and performance study, " IET Commun., vol. 10, no. 1, pp. 17-23, 2016.
-
(2016)
IET Commun.
, vol.10
, Issue.1
, pp. 17-23
-
-
Kuhestani, A.1
Mohammadi, A.2
-
21
-
-
84867800602
-
Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
-
Oct.
-
L. Sun, T. Zhang, Y. Li, and N. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes, " IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
Niu, N.4
-
22
-
-
84937132656
-
Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays
-
Jul.
-
J.-B. Kim, J. Lim, and J. M. Cioffi, "Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays, " IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3866-3876, Jul. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.7
, pp. 3866-3876
-
-
Kim, J.-B.1
Lim, J.2
Cioffi, J.M.3
-
23
-
-
84924902824
-
Security-aware relaying scheme for cooperative networks with untrusted relay nodes
-
Sep.
-
L. Sun, P. Ren, Q. Du, Y. Wang, and Z. Gao, "Security-aware relaying scheme for cooperative networks with untrusted relay nodes, " IEEE Commun. Lett., vol. 19, no. 3, pp. 463-466, Sep. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.19
, Issue.3
, pp. 463-466
-
-
Sun, L.1
Ren, P.2
Du, Q.3
Wang, Y.4
Gao, Z.5
-
24
-
-
84985015755
-
Relay selection for secure successive AF relaying networks with untrusted nodes
-
Nov.
-
W. Wang, K. C. Teh, and K. H. Li, "Relay selection for secure successive AF relaying networks with untrusted nodes, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2466-2476, Nov. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.11
, pp. 2466-2476
-
-
Wang, W.1
Teh, K.C.2
Li, K.H.3
-
25
-
-
84960105777
-
Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource constraints
-
Oct.
-
A. Mukherjee, "Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource constraints, " Proc. IEEE, vol. 103, no. 10, pp. 1747-1761, Oct. 2015.
-
(2015)
Proc. IEEE
, vol.103
, Issue.10
, pp. 1747-1761
-
-
Mukherjee, A.1
-
26
-
-
84991451214
-
Spectral-energy efficiency tradeoff in relay-aided massive MIMO cellular networks with pilot contamination
-
Sep.
-
J. Chen, H. Chen, H. Zhang, and F. Zhao, "Spectral-energy efficiency tradeoff in relay-aided massive MIMO cellular networks with pilot contamination, " IEEE Access, vol. 4, pp. 5234-5242, Sep. 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 5234-5242
-
-
Chen, J.1
Chen, H.2
Zhang, H.3
Zhao, F.4
-
27
-
-
84970027610
-
Spectral and energy efficiency of multipair two-way full-duplex relay systems with massive MIMO
-
Apr.
-
Z. Zhang, Z. Chen, M. Shen, and B. Xia, "Spectral and energy efficiency of multipair two-way full-duplex relay systems with massive MIMO, " IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 848-863, Apr. 2016.
-
(2016)
IEEE J. Sel. Areas Commun.
, vol.34
, Issue.4
, pp. 848-863
-
-
Zhang, Z.1
Chen, Z.2
Shen, M.3
Xia, B.4
-
28
-
-
79951681560
-
Secure wireless network connectivity with multi-antenna transmission
-
Feb.
-
X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission, " IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 425-430
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
-
29
-
-
84964855005
-
Secrecy outage probability of selective relaying wiretap channels with collaborative eavesdropping
-
P. L. Yeoh, N. Yang, and K. J. Kim, "Secrecy outage probability of selective relaying wiretap channels with collaborative eavesdropping, " in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2015, pp. 1-6.
-
(2015)
Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec.
, pp. 1-6
-
-
Yeoh, P.L.1
Yang, N.2
Kim, K.J.3
-
30
-
-
84910151447
-
Secure transmission with antenna selection in MIMO Nakagami-m fading channels
-
Nov.
-
L. Wang, M. Elkashlan, J. Huang, R. Schober, and R. K. Mallik, "Secure transmission with antenna selection in MIMO Nakagami-m fading channels, " IEEE Trans. Wireless Commun., vol. 13, no. 11, pp. 6054-6067, Nov. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.11
, pp. 6054-6067
-
-
Wang, L.1
Elkashlan, M.2
Huang, J.3
Schober, R.4
Mallik, R.K.5
-
31
-
-
0003498504
-
-
New York, NY, USA: Academic
-
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products. 7th ed. New York, NY, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series, and Products. 7th Ed
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
32
-
-
84949922478
-
Relay authentication by exploiting I/Q imbalance in amplify-and-forward system
-
P. Hao, X. Wang, and A. Behnad, "Relay authentication by exploiting I/Q imbalance in amplify-and-forward system, " in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2014, pp. 613-618.
-
(2014)
Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec.
, pp. 613-618
-
-
Hao, P.1
Wang, X.2
Behnad, A.3
-
33
-
-
84976492192
-
Physical-layer authentication for wireless security enhancement: Current challenges and future developments
-
Jun.
-
X. Wang, P. Hao, and L. Hanzo, "Physical-layer authentication for wireless security enhancement: Current challenges and future developments, " IEEE Commun. Mag., vol. 54, no. 6, pp. 152-158, Jun. 2016.
-
(2016)
IEEE Commun. Mag.
, vol.54
, Issue.6
, pp. 152-158
-
-
Wang, X.1
Hao, P.2
Hanzo, L.3
-
34
-
-
0003663467
-
-
New York, NY, USA: McGraw-Hill
-
A. Papoulis, Probability, Random Variables, and Stochastic Processes. New York, NY, USA: McGraw-Hill, 1984.
-
(1984)
Probability, Random Variables, and Stochastic Processes
-
-
Papoulis, A.1
-
35
-
-
16544362849
-
Outage mutual information of space-time MIMO channels
-
Apr.
-
Z. Wang and G. B. Giannakis, "Outage mutual information of space-time MIMO channels, " IEEE Trans. Inf. Theory, vol. 50, no. 4, pp. 657-662, Apr. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.4
, pp. 657-662
-
-
Wang, Z.1
Giannakis, G.B.2
-
36
-
-
33644986718
-
A simple cooperative diversity method based on network path selection
-
Mar.
-
A. Bletsas, A. Khisti, D. P. Reed, and A. Lippman, "A simple cooperative diversity method based on network path selection, " IEEE J. Sel. Areas Commun., vol. 24, no. 3, pp. 659-672, Mar. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.3
, pp. 659-672
-
-
Bletsas, A.1
Khisti, A.2
Reed, D.P.3
Lippman, A.4
-
38
-
-
84919781032
-
Random matrix theory and wireless communications
-
A. M. Tulino and S. Verdú, "Random matrix theory and wireless communications, " Found. Trends Commun. Inf. Theory, vol. 1, no. 1, pp. 1-182, 2004.
-
(2004)
Found. Trends Commun. Inf. Theory
, vol.1
, Issue.1
, pp. 1-182
-
-
Tulino, A.M.1
Verdú, S.2
-
40
-
-
84860014980
-
Secure diversity-multiplexing tradeoff of zero-forcing transmit scheme at finite-SNR
-
Apr.
-
Z. Rezki and M. S. Alouini, "Secure diversity-multiplexing tradeoff of zero-forcing transmit scheme at finite-SNR, " IEEE Trans. Commun., vol. 60, no. 4, pp. 1138-1147, Apr. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.4
, pp. 1138-1147
-
-
Rezki, Z.1
Alouini, M.S.2
|