References
- C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Technical Journal, vol. 28, no. 4, pp. 656-715, 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
- A. D. Wyner, "The wire-tap channel," Bell Labs Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
- A. Chorti, S. M. Perlaza, Z. Han, and H. V. Poor, "On the resilience of wireless multiuser networks to passive and active eavesdroppers," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1850-1863, 2013. https://doi.org/10.1109/JSAC.2013.130917
- R. Negi and S. Goel, "Secret communication using artificial noise," in Proceedings of IEEE Vehicular Technology Conference (VTC), Dallas, TX, 2005.
- R. Negi and S. Goel, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, 2008. https://doi.org/10.1109/TWC.2008.060848
- X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation," IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 3831-3842, 2010. https://doi.org/10.1109/TVT.2010.2059057
- X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels," IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2170-2181, 2012. https://doi.org/10.1109/TVT.2013.2238687
- S. Gerbracht, Ch. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 704-716, 2012. https://doi.org/10.1109/TIFS.2011.2181946
- G. Zheng, P. D. Arapoglou, and B. Ottersten, "Physical layer security in multibeam satellite systems," IEEE Transactions on Wireless Communications, vol. 11, no. 2, pp. 852-863, 2012. https://doi.org/10.1109/TWC.2011.120911.111460
- N. Li, X. Tao, and J. Xu, "Artificial noise assisted communication in the multiuser downlink: optimal power allocation," IEEE Communications Letters, vol. 19, no. 2, pp. 295-298, 2015. https://doi.org/10.1109/LCOMM.2014.2385779
- N. Li, X. Tao, H. Wu, J. Xu, and Q. Cui, "Large-system analysis of artificial-noise-assisted communication in the multiuser downlink: ergodic secrecy sum rate and optimal power allocation," IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 7036-7050, 2016. https://doi.org/10.1109/TVT.2015.2493178
- I. Krikidis and B. Ottersten, "Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling," IEEE Signal Processing Letters, vol. 20, no. 2, pp. 141-144, 2013. https://doi.org/10.1109/LSP.2012.2234109
- H. Alves, R. D. Souza, M. Debbah, and M. Bennis, "Performance of transmit antenna selection physical layer security schemes," IEEE Signal Processing Letters, vol. 19, no. 6, pp. 372-375, 2012. https://doi.org/10.1109/LSP.2012.2195490
- B. He, X. Zhou, and T. D. Abhayapala, "Wireless physical layer security with imperfect channel state information: a survey," 2013 [Internet], Available: https://arxiv.org/pdf/1307.4146.pdf.
- I. Telatar, "Capacity of multi- antenna Gaussian channels," European Transactions on Telecommunications, vol. 10, no. 6, pp. 585-595, 1999. https://doi.org/10.1002/ett.4460100604
- W. C. Liao, T. H. Chang, W. K. Ma, and C. Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach," IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1202-1216, 2011. https://doi.org/10.1109/TSP.2010.2094610
- N. S. Ferdinand, D. B. da Costa, and M. Latva-aho, "Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection," IEEE Communications Letters, vol. 17, no. 5, pp. 864-867, 2013. https://doi.org/10.1109/LCOMM.2013.040213.122696