1 |
C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Technical Journal, vol. 28, no. 4, pp. 656-715, 1949.
DOI
|
2 |
A. D. Wyner, "The wire-tap channel," Bell Labs Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
DOI
|
3 |
A. Chorti, S. M. Perlaza, Z. Han, and H. V. Poor, "On the resilience of wireless multiuser networks to passive and active eavesdroppers," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1850-1863, 2013.
DOI
|
4 |
R. Negi and S. Goel, "Secret communication using artificial noise," in Proceedings of IEEE Vehicular Technology Conference (VTC), Dallas, TX, 2005.
|
5 |
R. Negi and S. Goel, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, 2008.
DOI
|
6 |
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation," IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 3831-3842, 2010.
DOI
|
7 |
X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels," IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2170-2181, 2012.
DOI
|
8 |
S. Gerbracht, Ch. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 704-716, 2012.
DOI
|
9 |
G. Zheng, P. D. Arapoglou, and B. Ottersten, "Physical layer security in multibeam satellite systems," IEEE Transactions on Wireless Communications, vol. 11, no. 2, pp. 852-863, 2012.
DOI
|
10 |
N. Li, X. Tao, and J. Xu, "Artificial noise assisted communication in the multiuser downlink: optimal power allocation," IEEE Communications Letters, vol. 19, no. 2, pp. 295-298, 2015.
DOI
|
11 |
N. Li, X. Tao, H. Wu, J. Xu, and Q. Cui, "Large-system analysis of artificial-noise-assisted communication in the multiuser downlink: ergodic secrecy sum rate and optimal power allocation," IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 7036-7050, 2016.
DOI
|
12 |
I. Krikidis and B. Ottersten, "Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling," IEEE Signal Processing Letters, vol. 20, no. 2, pp. 141-144, 2013.
DOI
|
13 |
W. C. Liao, T. H. Chang, W. K. Ma, and C. Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach," IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1202-1216, 2011.
DOI
|
14 |
H. Alves, R. D. Souza, M. Debbah, and M. Bennis, "Performance of transmit antenna selection physical layer security schemes," IEEE Signal Processing Letters, vol. 19, no. 6, pp. 372-375, 2012.
DOI
|
15 |
B. He, X. Zhou, and T. D. Abhayapala, "Wireless physical layer security with imperfect channel state information: a survey," 2013 [Internet], Available: https://arxiv.org/pdf/1307.4146.pdf.
|
16 |
I. Telatar, "Capacity of multi- antenna Gaussian channels," European Transactions on Telecommunications, vol. 10, no. 6, pp. 585-595, 1999.
DOI
|
17 |
N. S. Ferdinand, D. B. da Costa, and M. Latva-aho, "Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection," IEEE Communications Letters, vol. 17, no. 5, pp. 864-867, 2013.
DOI
|