Citation: | LEI Weijia, LIN Xiuzhen, YANG Xiaoyan, XIE Xianzhong. Physical Layer Security Scheme Exploiting Artificial Noise to Improve the Performance of Legitimate User[J]. Journal of Electronics & Information Technology, 2016, 38(11): 2887-2892. doi: 10.11999/JEIT160054 |
SHANNON C E. Communication theory of secrecy system[J]. Bell System Technical Journal, 1949, 28(4): 656-710. doi: 10.1002/j.1538-7305.1949.tb00928.x.
|
HONG W Y P, LAN P C, and KUO C C J. Enhancing physical-layer secrecy in multi-antenna wireless systems: an overview of signal processing approaches[J]. IEEE Signal Processing Magazine, 2013, 30(5): 29-40. doi: 10.1109/ MSP.2013.2256953.
|
CHEN X, ZHONG C, YUEN C, et al. Multi-antenna relay aided wireless physical layer security[J]. IEEE Communications Magazine, 2015, 53(12): 40-46. doi: 10.1109/MCOM.2015.7355564.
|
CHEN X and LEI L. Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee[J]. IEEE Communications Letters, 2013, 17(4): 637-640. doi: 10.1109/LCOMM.2013.022713.130029.
|
MA H and MA P. Beamforming design of decode-and- forward cooperation for improving wireless physical layer security[C]. 2013 15th International Conference on Advanced Communication Technology (ICACT), PyeongChang, 2013: 41-49.
|
NEGI R and GOEL S. Secret communication using artificial noise[C]. IEEE Vehicular Technology Conference (VTC-2005-Fall), Dallas, USA, 2005: 1906-1910. doi: 10.1109/VETECF.2005.1558439
|
CHAE S H, CHOI W, LEE J H, et al. Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(10): 1617-1627. doi: 10.1109/TIFS.2014.2341453.
|
GREBRACHT S, WOLF A, and JORSWIECK E A. Beamforming for fading wiretap channels with partial channel information[C]. International Workshop on Smart Antennas, Bremen, Germany, 2010: 394-401. doi: 10.1109/ WSA.2010.5456398.
|
HUANG J and SWINDLEHURST A L. Robust secure transmission in MISO channels based on worst-case optimization[J]. IEEE Transactions on Signal Processing, 2012, 60(4): 1696-1707. doi: 10.1109/TSP.2011.2182344.
|
GREBRACHT S, SCHEUNERT C, and JORSWIECK E A. Secrecy outage in MISO systems with partial channel information[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 704-716. doi: 10.1109/TIFS. 2011.2181946.
|
HU F, GAO F, ZHANG T, et al. Physical-layer security for full-duplex communications with self-interference mitigation[J]. IEEE Transactions on Wireless Communications, 2016, 15(1): 329-340. doi: 10.1109/TWC. 2015.2472527.
|
YANG Y, SUN C, ZHAO H, et al. Algorithms for secrecy guarantee with null space beamforming in two-way relay networks[J]. IEEE Transactions on Signal Processing, 2014, 62(8): 2111-2126. doi: 10.1109/TSP.2014.2303942.
|
ZHANG X, ZHOU X, MCKAY M R, et al. Arti cial-noise-aided secure multi-antenna transmission with limited feedback[J]. IEEE Transactions on Wireless Communications, 2015, 14(5): 2742-2754. doi: 10.1109/ ICASSP.2014.6854346.
|
SIMON M K and ALOUIION M S. Digital Communication over Fading Channels[M]. New York: John Wiley Sons, Inc., 2000: 265-267.
|