2017
DOI: 10.1109/comst.2016.2633387
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Multiple-Antenna Techniques for Physical Layer Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
242
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 438 publications
(245 citation statements)
references
References 261 publications
2
242
0
1
Order By: Relevance
“…Physical layer security has been regarded as a promising safeguard technology for wireless communications through utilizing the time-varying nature of the wireless fading channels [23], [24]. In the last several years, the secrecy performance of wireless fading systems was studied in many literatures [25]- [33]. In these great works, the fundamental theories of physical layer security were introduced and the state-of-the-art works on physical layer security technologies were provided.…”
Section: A Background and Related Workmentioning
confidence: 99%
“…Physical layer security has been regarded as a promising safeguard technology for wireless communications through utilizing the time-varying nature of the wireless fading channels [23], [24]. In the last several years, the secrecy performance of wireless fading systems was studied in many literatures [25]- [33]. In these great works, the fundamental theories of physical layer security were introduced and the state-of-the-art works on physical layer security technologies were provided.…”
Section: A Background and Related Workmentioning
confidence: 99%
“…denotes the distance between the BSs and the target user. Therefore, according to the Motley-Keenan path loss model in [1], the unit of the path loss is obtained as follows:…”
Section: System Modelmentioning
confidence: 99%
“…Wireless systems are more vulnerable due to the broadcast nature of wireless communications, which is solved by adding keys to the application layer in traditional research. Recently, the physical layer security technology can securely transmit information through the orthogonal characteristics of the physical layer resources [1]. The ultra-dense network is one of the key technologies in the fifth generation mobile communication systems, where the frequency utilization and coverage are improved [2]; with the deployment of ultra-dense networks, the coverage and improvement of the system throughput are the main fields in the research on its performance and transmission technologies.…”
Section: Introductionmentioning
confidence: 99%
“…As a complement to the conventional upper-layer solutions, such as cryptographic techniques, various physical layer secrecy (PLS) techniques have been proposed to provide perfect security in wireless communication systems [9]- [12], which were first studied in the context of wiretap channels by Wyner in [13] for point-to-point communication systems and later for broadcast channels by Csiszár and Körner in [14], and for Gaussian wiretap channels in [15]. These contributions focused on maximizing the data rate of secret communications, namely, the secrecy capacity of a wiretap channel where a source transmitter (S) is equipped with multiple antennas for confidentially communicating with a legitimate destination receiver (D), while a passive eavesdropper (E) is trying to wiretap the confidential information of S and D. PLS techniques have been applied to a wide range of RF wireless systems, which has improved the overall security by complementing existing classic cryptography-based techniques [10]. However, given the average optical power, the peak optical power and the electrical power constraints imposed on the VLC signals, these techniques developed for RF wireless communication systems cannot be directly transplanted into practical VLC scenarios.…”
Section: Introductionmentioning
confidence: 99%