{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T02:21:34Z","timestamp":1767925294501,"version":"3.49.0"},"reference-count":99,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T00:00:00Z","timestamp":1560470400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T00:00:00Z","timestamp":1560470400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11276-019-02060-0","type":"journal-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T19:02:36Z","timestamp":1560538956000},"page":"2089-2111","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Physical layer security schemes for MIMO systems: an overview"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0234-4419","authenticated-orcid":false,"given":"Reem","family":"Melki","sequence":"first","affiliation":[]},{"given":"Hassan N.","family":"Noura","sequence":"additional","affiliation":[]},{"given":"Mohammad M.","family":"Mansour","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,14]]},"reference":[{"issue":"2","key":"2060_CR1","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/MCOM.2017.1600437CM","volume":"55","author":"N Saxena","year":"2017","unstructured":"Saxena, N., Roy, A., Sahu, B., & Kim, H. (2017). Efficient IoT gateway over 5G wireless: A new design with prototype and implementation results. IEEE Communications Magazine, 55(2), 97\u2013105.","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"2060_CR2","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/MCOM.2017.1600407CM","volume":"55","author":"R Ford","year":"2017","unstructured":"Ford, R., Zhang, M., Mezzavilla, M., Dutta, S., Rangan, S., & Zorzi, M. (2017). Achieving ultra-low latency in 5G millimeter wave cellular networks. IEEE Communications Magazine, 55(3), 196\u2013203.","journal-title":"IEEE Communications Magazine"},{"key":"2060_CR3","doi-asserted-by":"crossref","unstructured":"Sun, S., MacCartney, G., & Rappaport, T. (2017). A novel millimeter-wave channel simulator and applications for 5G wireless communications. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1\u20137). IEEE.","DOI":"10.1109\/ICC.2017.7996792"},{"key":"2060_CR4","doi-asserted-by":"crossref","unstructured":"Rappaport, T., Xing, Y., et\u00a0al. (2017). Overview of millimeter wave communications for fifth-generation (5G) wireless networks-with a focus on propagation models. arXiv preprint \narXiv:1708.02557","DOI":"10.1109\/TAP.2017.2734243"},{"key":"2060_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/9781316771655","volume-title":"Key technologies for 5G wireless systems","author":"V Wong","year":"2017","unstructured":"Wong, V., Schober, R., Ng, D., & Wang, L. (2017). Key technologies for 5G wireless systems. Cambridge: Cambridge University Press."},{"key":"2060_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/9780470825631","volume-title":"MIMO-OFDM wireless communications with MATLAB","author":"Y Cho","year":"2010","unstructured":"Cho, Y., Kim, J., Yang, W., & Kang, C. (2010). MIMO-OFDM wireless communications with MATLAB. New York: Wiley."},{"issue":"1","key":"2060_CR7","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MAP.2016.2630020","volume":"59","author":"W Fan","year":"2017","unstructured":"Fan, W., Carton, I., et al. (2017). A step toward 5G in 2020: Low-cost OTA performance evaluation of massive MIMO base stations. IEEE Antennas and Propagation Magazine, 59(1), 38\u201347.","journal-title":"IEEE Antennas and Propagation Magazine"},{"issue":"9","key":"2060_CR8","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/MCOM.2017.1600400","volume":"55","author":"A Molisch","year":"2017","unstructured":"Molisch, A., et al. (2017). Hybrid beamforming for massive MIMO: A survey. IEEE Communications Magazine, 55(9), 134\u2013141.","journal-title":"IEEE Communications Magazine"},{"key":"2060_CR9","doi-asserted-by":"crossref","unstructured":"Umebayashi, K., et\u00a0al. (2014). A study on secure pilot signal design for OFDM systems. In Asia-Pacific signal and information processing association annual summit and conference (APSIPA) (pp. 1\u20135).","DOI":"10.1109\/APSIPA.2014.7041552"},{"key":"2060_CR10","first-page":"3","volume":"85","author":"J Massey","year":"1986","unstructured":"Massey, J. (1986). Cryptography\u2014a selective survey. Digital Communications, 85, 3\u201325.","journal-title":"Digital Communications"},{"issue":"6","key":"2060_CR11","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M Bloch","year":"2008","unstructured":"Bloch, M., et al. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory, 54(6), 2515\u20132534.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"2060_CR12","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"Shannon, C. (1949). Communication theory of secrecy systems. Bell Labs Technical Journal, 28(4), 656\u2013715.","journal-title":"Bell Labs Technical Journal"},{"issue":"4","key":"2060_CR13","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/18.243431","volume":"39","author":"R Ahlswede","year":"1993","unstructured":"Ahlswede, R., et al. (1993). Common randomness in information theory and cryptography. I. Secret sharing. IEEE Transactions on Information Theory, 39(4), 1121\u20131132.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"8","key":"2060_CR14","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A Wyner","year":"1975","unstructured":"Wyner, A. (1975). The wire-tap channel. Bell Labs Technical Journal, 54(8), 1355\u20131387.","journal-title":"Bell Labs Technical Journal"},{"key":"2060_CR15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985","volume-title":"Physical-layer security","author":"M Bloch","year":"2011","unstructured":"Bloch, M., & Barros, J. (2011). Physical-layer security. Cambridge: Cambridge University Press."},{"issue":"3","key":"2060_CR16","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"A Mukherjee","year":"2014","unstructured":"Mukherjee, A., et al. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1550\u20131573.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"2060_CR17","unstructured":"MIMO antenna beamforming: Radio-electronics.com. \nhttp:\/\/www.radio-electronics.com\/info\/antennas\/mimo\/antenna-beamforming.php\n\n. Accessed on 01 April 2018"},{"key":"2060_CR18","doi-asserted-by":"crossref","unstructured":"Gibalina, Z., et\u00a0al. (2018). Estimation of capabilities of cooperative CubeSat systems based on Alamouti transmission scheme. In Systems of signal synchronization, generating and processing in telecommunications (SYNCHROINFO) (pp. 1\u20136). IEEE.","DOI":"10.1109\/SYNCHROINFO.2018.8456940"},{"issue":"1","key":"2060_CR19","doi-asserted-by":"publisher","first-page":"13","DOI":"10.5121\/ijcnc.2017.9102","volume":"9","author":"W Shehab","year":"2017","unstructured":"Shehab, W., & Al-qudah, Z. (2017). Singular value decomposition: Principles and applications in multiple input multiple output communication system. International Journal of Computer Networks and Communications, 9(1), 13\u201321.","journal-title":"International Journal of Computer Networks and Communications"},{"key":"2060_CR20","unstructured":"Abdelrahman, R.B.M., Mustafa, A.B.A., & Osman, A.A. (2015). A comparison between IEEE 802.11 n and ac standards. IOSR Journal of Computer Engineering (IOSR-JCE), 17(5), 30\u201334."},{"key":"2060_CR21","doi-asserted-by":"publisher","unstructured":"Yan, H., & Lu, I. (2019). Asynchronous reception effects on distributed massive MIMO\u2013OFDM system. IEEE Transactions on Communications. \nhttps:\/\/doi.org\/10.1109\/TCOMM.2019.2908401","DOI":"10.1109\/TCOMM.2019.2908401"},{"issue":"7","key":"2060_CR22","doi-asserted-by":"publisher","first-page":"3511","DOI":"10.1109\/TMTT.2018.2814592","volume":"66","author":"D Schindler","year":"2018","unstructured":"Schindler, D., et al. (2018). MIMO\u2013OFDM radar using a linear frequency modulated carrier to reduce sampling requirements. IEEE Transactions on Microwave Theory and Techniques, 66(7), 3511\u20133520.","journal-title":"IEEE Transactions on Microwave Theory and Techniques"},{"issue":"4","key":"2060_CR23","doi-asserted-by":"publisher","first-page":"1567","DOI":"10.1109\/SURV.2013.021313.00164","volume":"15","author":"Y Rahmatallah","year":"2013","unstructured":"Rahmatallah, Y., & Mohan, S. (2013). Peak-to-average power ratio reduction in OFDM systems: A survey and taxonomy. IEEE Communications Surveys & Tutorials, 15(4), 1567\u20131592.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"5","key":"2060_CR24","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/35.54342","volume":"28","author":"J Bingham","year":"1990","unstructured":"Bingham, J. (1990). Multicarrier modulation for data transmission: An idea whose time has come. IEEE Communications Magazine, 28(5), 5\u201314.","journal-title":"IEEE Communications Magazine"},{"key":"2060_CR25","volume-title":"OFDM for wireless communications systems","author":"R Prasad","year":"2004","unstructured":"Prasad, R. (2004). OFDM for wireless communications systems. Norwood: Artech House."},{"key":"2060_CR26","unstructured":"Concepts of orthogonal frequency division multiplexing (OFDM) and 802.11 WLAN. \nhttp:\/\/rfmw.em.keysight.com\/wireless\/helpfiles\/89600b\/webhelp\/subsystems\/wlan-ofdm\/content\/ofdm_basicprinciplesoverview.htm\n\n. Accessed on 01 April 2018."},{"key":"2060_CR27","unstructured":"802.11 OFDM WLAN overview. \nhttp:\/\/rfmw.em.keysight.com\/wireless\/helpfiles\/89600b\/webhelp\/subsystems\/wlan-ofdm\/content\/ofdm_80211-overview.htm\n\n. Accessed on 01 April 2018."},{"key":"2060_CR28","unstructured":"He, Q., & Schmeink, A. (2015). Comparison and evaluation between FBMC and OFDM systems. In Proceedings of the international ITG workshop on smart antennas (WSA) (pp. 1\u20137). VDE."},{"key":"2060_CR29","unstructured":"Roessler, A. (2016). 5G waveform candidates application note. Technical Report. 1MA271. Munich: Rohde & Schwarz."},{"issue":"57","key":"2060_CR30","first-page":"1","volume":"800","author":"E Barker","year":"2012","unstructured":"Barker, E., et al. (2012). Recommendation for key management part 1: General (revision 3). NIST Special Publication, 800(57), 1\u2013147.","journal-title":"NIST Special Publication"},{"key":"2060_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al. (2015). Verification of key generation from individual OFDM subcarrier\u2019s channel response. In Proceedings of the IEEE global communication conference workshops (GC workshops) (pp. 1\u20136).","DOI":"10.1109\/GLOCOMW.2015.7414111"},{"issue":"6","key":"2060_CR32","doi-asserted-by":"publisher","first-page":"3775","DOI":"10.1109\/TWC.2017.2688405","volume":"16","author":"H Rahbari","year":"2017","unstructured":"Rahbari, H., & Krunz, M. (2017). Exploiting frame preamble waveforms to support new physical-layer functions in OFDM-based 802.11 systems. IEEE Transactions on Wireless Communications, 16(6), 3775\u20133786.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2060_CR33","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"Shannon, C. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal, 28, 656\u2013715.","journal-title":"Bell Systems Technical Journal"},{"key":"2060_CR34","volume-title":"Understanding cryptography: A textbook for students and practitioners","author":"C Paar","year":"2009","unstructured":"Paar, C., & Pelzl, J. (2009). Understanding cryptography: A textbook for students and practitioners. Berlin: Springer."},{"key":"2060_CR35","unstructured":"Wankhede, S.B. (2019). Study of network-based DoS attacks. In Nanoelectronics, circuits and communication systems (Vol. 511, pp. 611\u2013616). Singapore: Springer."},{"key":"2060_CR36","doi-asserted-by":"crossref","unstructured":"Wang, F., et al. (2017). Poster abstract: Security in uplink MU-MIMO networks. In V. Nath, JK Mandal (Eds.), IEEE\/ACM second international conference on internet-of-things design and implementation (IoTDI) (pp. 351\u2013352).","DOI":"10.1145\/3054977.3057325"},{"key":"2060_CR37","unstructured":"Tomasin, S. (2017). Comparison between asymmetric and symmetric channel-based authentication for MIMO systems. In International ITG workshop on smart antennas (WSA) (pp. 1\u20135)."},{"issue":"8","key":"2060_CR38","doi-asserted-by":"publisher","first-page":"7474","DOI":"10.1109\/TVT.2017.2652484","volume":"66","author":"L Xiao","year":"2017","unstructured":"Xiao, L., et al. (2017). Game theoretic study on channel-based authentication in MIMO systems. IEEE Transactions on Vehicular Technology, 66(8), 7474\u20137484.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2060_CR39","doi-asserted-by":"crossref","unstructured":"Xiao, L., et al. (2016). Channel-based authentication game in MIMO systems. In Proceedings of the IEEE global communications conference (GLOBECOM) (pp. 1\u20136).","DOI":"10.1109\/GLOCOM.2016.7841657"},{"key":"2060_CR40","doi-asserted-by":"crossref","unstructured":"Topal, O., et al. (2017). Space-frequency grouping based key extraction for MIMO\u2013OFDM systems. In International Symposium on wireless communication systems (ISWCS) (pp. 320\u2013324).","DOI":"10.1109\/ISWCS.2017.8108133"},{"issue":"7","key":"2060_CR41","doi-asserted-by":"publisher","first-page":"1453","DOI":"10.1109\/TIFS.2016.2532841","volume":"11","author":"K Chen","year":"2016","unstructured":"Chen, K., & Natarajan, B. (2016). Evaluating node reliability in cooperative MIMO networks. IEEE Transactions on Information Forensics and Security, 11(7), 1453\u20131460.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2060_CR42","doi-asserted-by":"crossref","unstructured":"Cheng, L., et al. (2015). Secret key generation via random beamforming in stationary environment. In Proceedings of the international conference on wireless communications and signal processing (WCSP) (pp. 1\u20135).","DOI":"10.1109\/WCSP.2015.7341290"},{"key":"2060_CR43","unstructured":"Yakovlev, V., et al. (2016). Secret key agreement based on a communication through wireless MIMO fading channels. In Federated conference on computer science and information systems (FedCSIS) (pp. 823\u2013830)."},{"issue":"12","key":"2060_CR44","doi-asserted-by":"publisher","first-page":"2693","DOI":"10.1109\/TIFS.2016.2594143","volume":"11","author":"D Qin","year":"2016","unstructured":"Qin, D., & Ding, Z. (2016). Exploiting multi-antenna non-reciprocal channels for shared secret key generation. IEEE Transactions on Information Forensics and Security, 11(12), 2693\u20132705.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"2060_CR45","doi-asserted-by":"publisher","first-page":"2424","DOI":"10.1109\/TIFS.2015.2462756","volume":"10","author":"K Chen","year":"2015","unstructured":"Chen, K., et al. (2015). Secret key generation rate with power allocation in relay-based LTE-A networks. IEEE Transactions on Information Forensics and Security, 10(11), 2424\u20132434.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"2060_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/iet-ifs.2014.0530","volume":"11","author":"H Taha","year":"2017","unstructured":"Taha, H., & Alsusa, E. (2017). Secret key establishment technique using channel state information driven phase randomisation in multiple-input multiple-output orthogonal frequency division multiplexing. IET Information Security, 11(1), 1\u20137.","journal-title":"IET Information Security"},{"issue":"4","key":"2060_CR47","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/JCN.2017.000060","volume":"19","author":"J Choi","year":"2017","unstructured":"Choi, J. (2017). Secret key transmission for OFDM based machine type communications. Journal of Communications and Networks, 19(4), 363\u2013370.","journal-title":"Journal of Communications and Networks"},{"key":"2060_CR48","doi-asserted-by":"crossref","unstructured":"Choi, J., & Ha, J. (2016). Secret key transmission based on channel reciprocity for secure IoT. In European conference on networks and communications (EuCNC) (pp. 388\u2013392).","DOI":"10.1109\/EuCNC.2016.7561068"},{"key":"2060_CR49","doi-asserted-by":"crossref","unstructured":"Furqan, H., et al. (2016). Secret key generation using channel quantization with SVD for reciprocal MIMO channels. In International Symposium on wireless communication systems (ISWCS) (pp. 597\u2013602).","DOI":"10.1109\/ISWCS.2016.7600974"},{"key":"2060_CR50","doi-asserted-by":"crossref","unstructured":"Wang, Y., & Zhang, L. (2017). High security orthogonal factorized channel scrambling scheme with location information embedded for MIMO-based VLC system. In IEEE Proceedings of the vehicular technology conference (VTC Spring) (pp. 1\u20135).","DOI":"10.1109\/VTCSpring.2017.8108583"},{"key":"2060_CR51","doi-asserted-by":"crossref","unstructured":"Taha, H., & Alsusa, E. (2016). Secret key exchange under physical layer security using MIMO private random precoding in FDD systems. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1\u20136).","DOI":"10.1109\/ICC.2016.7511622"},{"key":"2060_CR52","doi-asserted-by":"crossref","unstructured":"Taha, H., & Alsusa, E. (2015). A MIMO precoding based physical layer security technique for key exchange encryption. In IEEE Proceedings of the vehicular technology conference (VTC Spring) (pp. 1\u20135).","DOI":"10.1109\/VTCSpring.2015.7145622"},{"issue":"6","key":"2060_CR53","doi-asserted-by":"publisher","first-page":"4823","DOI":"10.1109\/TVT.2016.2611565","volume":"66","author":"H Taha","year":"2017","unstructured":"Taha, H., & Alsusa, E. (2017). Secret key exchange using private random precoding in MIMO FDD and TDD systems. IEEE Transactions on Vehicular Technology, 66(6), 4823\u20134833.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2060_CR54","doi-asserted-by":"crossref","unstructured":"Yaacoub, E. (2016). On secret key generation with massive MIMO antennas using time-frequency-space dimensions. In IEEE Middle East conference on antennas and propagation (MECAP) (pp. 1\u20134).","DOI":"10.1109\/MECAP.2016.7790086"},{"issue":"3","key":"2060_CR55","doi-asserted-by":"publisher","first-page":"2165","DOI":"10.1109\/TVT.2017.2764388","volume":"67","author":"H Taha","year":"2017","unstructured":"Taha, H., & Alsusa, E. (2017). Secret key exchange and authentication via randomized spatial modulation and phase shifting. IEEE Transactions on Vehicular Technology, 67(3), 2165\u20132177.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2060_CR56","doi-asserted-by":"crossref","unstructured":"Taha, H., & Alsusa, E. (2017). PHY-SEC: Secret key exchange and authentication via random spatial modulation and phase shifting. In IEEE proceedings of the international wireless communications and mobile computing conference (IWCMC) (pp. 1327\u20131332).","DOI":"10.1109\/IWCMC.2017.7986477"},{"issue":"2","key":"2060_CR57","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1109\/COMST.2016.2633387","volume":"19","author":"X Chen","year":"2017","unstructured":"Chen, X., Ng, D., Gerstacker, W., & Chen, H. (2017). A survey on multiple-antenna techniques for physical layer security. IEEE Communications Surveys and Tutorials, 19(2), 1027\u20131053.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"2060_CR58","doi-asserted-by":"crossref","unstructured":"Guan, K., et al. (2016). A computationally efficient shift-register based information scrambling approach to physical layer security in MIMO-SDM systems. In Optical fiber communications conference and exhibition (OFC) (pp. 1\u20133).","DOI":"10.1364\/OFC.2016.Th4C.6"},{"key":"2060_CR59","doi-asserted-by":"crossref","unstructured":"Guan, K., et al. (2015). Enhanced physical layer security of MIMO-SDM systems through information scrambling. In European conference on optical communication (ECOC) (pp. 1\u20133).","DOI":"10.1109\/ECOC.2015.7341892"},{"key":"2060_CR60","doi-asserted-by":"crossref","unstructured":"Tanigawa, Y., et al. (2017). A physical layer security scheme employing imaginary receiver for multiuser MIMO\u2013OFDM systems. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1\u20136).","DOI":"10.1109\/ICC.2017.7997486"},{"key":"2060_CR61","doi-asserted-by":"crossref","unstructured":"Ahmed, M., & Bai, L. (2017). Space time block coding aided physical layer security in Gaussian MIMO channels. In International Bhurban conference on applied sciences and technology (IBCAST) (pp. 805\u2013808).","DOI":"10.1109\/IBCAST.2017.7868148"},{"issue":"3","key":"2060_CR62","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1109\/TIFS.2016.2627219","volume":"12","author":"Y Liu","year":"2017","unstructured":"Liu, Y., et al. (2017). Secrecy capacity analysis of artificial noisy MIMO channels\u2014an approach based on ordered eigenvalues of Wishart matrices. IEEE Transactions on Information Forensics and Security, 12(3), 617\u2013630.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2060_CR63","unstructured":"Li, G., & Hu, A. (2016). Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security. In IEEE proceedings of the international conference communications China (ICCC), (pp. 2246\u20132250)."},{"key":"2060_CR64","doi-asserted-by":"crossref","unstructured":"Chen, X., et al. (2015). Security in MIMO wireless hybrid channel with artificial noise. In International conference on cyber security of smart cities, industrial control system and communications (SSIC) (pp. 1\u20134).","DOI":"10.1109\/SSIC.2015.7245676"},{"issue":"5","key":"2060_CR65","first-page":"3871","volume":"66","author":"A Shafie","year":"2017","unstructured":"Shafie, A., et al. (2017). Hybrid spatio-temporal artificial noise design for secure MIMOME\u2013OFDM systems. IEEE Transactions on Vehicular Technology, 66(5), 3871\u20133886.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2060_CR66","doi-asserted-by":"crossref","unstructured":"Kozai, Y., & Saba, T. (2015). An artificial fast fading generation scheme for physical layer security of MIMO\u2013OFDM systems. In International conference on signal processing and communication systems (ICSPCS) (pp. 1\u20135).","DOI":"10.1109\/ICSPCS.2015.7391734"},{"issue":"1","key":"2060_CR67","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/LCOMM.2017.2762319","volume":"21","author":"X Li","year":"2017","unstructured":"Li, X., et al. (2017). Hybrid massive MIMO for secure transmissions against stealthy eavesdroppers. IEEE Communications Letters, 21(1), 81\u201384.","journal-title":"IEEE Communications Letters"},{"key":"2060_CR68","doi-asserted-by":"crossref","unstructured":"Khandaker, M., et al. (2017). Constructive interference based secure precoding. In IEEE proceedings of the international Symposium on information theory (ISIT), (pp. 2875\u20132879).","DOI":"10.1109\/ISIT.2017.8007055"},{"issue":"2","key":"2060_CR69","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/JSYST.2015.2413843","volume":"11","author":"X Chen","year":"2017","unstructured":"Chen, X., & Zhang, Y. (2017). Mode selection in MU-MIMO downlink networks: A physical-layer security perspective. IEEE Systems Journal, 11(2), 1128\u20131136.","journal-title":"IEEE Systems Journal"},{"issue":"4","key":"2060_CR70","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/LWC.2016.2569526","volume":"5","author":"A El Shafie","year":"2016","unstructured":"El Shafie, A., et al. (2016). Enhancing the PHY-layer security of MIMO buffer-aided relay networks. IEEE Wireless Communications Letters, 5(4), 400\u2013403.","journal-title":"IEEE Wireless Communications Letters"},{"key":"2060_CR71","unstructured":"Zhang, L., et al. (2016). The performance of the MIMO physical layer security system with imperfect CSI. In IEEE conference on communications and network security (CNS) (pp. 346\u2013347)."},{"key":"2060_CR72","doi-asserted-by":"publisher","first-page":"3016","DOI":"10.1109\/ACCESS.2016.2580673","volume":"4","author":"B Chen","year":"2016","unstructured":"Chen, B., et al. (2016). Original symbol phase rotated secure transmission against powerful massive MIMO eavesdropper. IEEE Access, 4, 3016\u20133025.","journal-title":"IEEE Access"},{"key":"2060_CR73","doi-asserted-by":"publisher","first-page":"5374","DOI":"10.1109\/ACCESS.2016.2608932","volume":"4","author":"B Chen","year":"2016","unstructured":"Chen, B., et al. (2016). Securing uplink transmission for lightweight single-antenna UEs in the presence of a massive MIMO eavesdropper. IEEE Access, 4, 5374\u20135384.","journal-title":"IEEE Access"},{"issue":"6","key":"2060_CR74","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1049\/iet-com.2016.0617","volume":"11","author":"L Zhang","year":"2017","unstructured":"Zhang, L., et al. (2017). Non-linear transceiver design for secure communications with artificial noise-assisted MIMO relay. IET Communications, 11(6), 930\u2013935.","journal-title":"IET Communications"},{"key":"2060_CR75","doi-asserted-by":"crossref","unstructured":"Yaacoub, E., & Al-Husseini, M. (2017). Achieving physical layer security with massive MIMO beamforming. In European conference on antennas and propagation (EUCAP) (pp. 1753\u20131757).","DOI":"10.23919\/EuCAP.2017.7928045"},{"key":"2060_CR76","unstructured":"Tang, J., et al. (2015). Combining MIMO beamforming with security codes to achieve unconditional communication security. In IEEE proceedings of the international conference on communications in China (ICCC) (pp. 105\u2013109)."},{"key":"2060_CR77","unstructured":"Tang, J., & Wen, H., et\u00a0al. (2015). Combining MIMO beamforming with security codes to achieve unconditional communication security. In IEEE proceedings of the international conference on communications in China (ICCC) (pp. 105\u2013109)."},{"issue":"3","key":"2060_CR78","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1109\/WCL.2014.030514.140092","volume":"3","author":"H Wen","year":"2014","unstructured":"Wen, H., et al. (2014). Achieving secure communications over wiretap channels via security codes from resilient functions. IEEE Wireless Communications Letters, 3(3), 273\u2013276.","journal-title":"IEEE Wireless Communications Letters"},{"key":"2060_CR79","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al. (2015). Joint transmit antenna selection and jamming for security enhancement in MIMO wiretap channels. In IEEE proceedings of the international conference on communications in China (ICCC) (pp. 1\u20136).","DOI":"10.1109\/ICCChina.2015.7448598"},{"key":"2060_CR80","doi-asserted-by":"crossref","unstructured":"Jayasinghe, K., et al. (2015). Physical layer security for relay assisted MIMO D2D communication. In IEEE proceedings of the international conference on communications workshop (ICCW) (pp. 651\u2013656).","DOI":"10.1109\/ICCW.2015.7247255"},{"key":"2060_CR81","doi-asserted-by":"publisher","first-page":"5747","DOI":"10.1109\/ACCESS.2017.2694478","volume":"5","author":"Y Fan","year":"2017","unstructured":"Fan, Y., et al. (2017). Physical layer security based on interference alignment in K-User MIMO Y wiretap channels. IEEE Access, 5, 5747\u20135759.","journal-title":"IEEE Access"},{"issue":"3","key":"2060_CR82","doi-asserted-by":"publisher","first-page":"2059","DOI":"10.1109\/TVT.2016.2578943","volume":"66","author":"S Gong","year":"2017","unstructured":"Gong, S., et al. (2017). Millimeter-wave secrecy beamforming designs for two-way amplify-and-forward MIMO relaying networks. IEEE Transactions on Vehicular Technology, 66(3), 2059\u20132071.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2060_CR83","doi-asserted-by":"crossref","unstructured":"Qassim, Y., et al. (2017). Post-quantum hybrid security mechanism for MIMO systems. In International conference on computing, networking and communications (ICNC) (pp. 684\u2013689).","DOI":"10.1109\/ICCNC.2017.7876212"},{"issue":"2","key":"2060_CR84","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/TGCN.2017.2684827","volume":"1","author":"H Lei","year":"2017","unstructured":"Lei, H., et al. (2017). On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection. IEEE Transactions on Green Communications and Networking, 1(2), 192\u2013203.","journal-title":"IEEE Transactions on Green Communications and Networking"},{"issue":"8","key":"2060_CR85","doi-asserted-by":"publisher","first-page":"1478","DOI":"10.1109\/JSTSP.2016.2600521","volume":"10","author":"A Kalantari","year":"2016","unstructured":"Kalantari, A., et al. (2016). Directional modulation via symbol-level precoding: A way to enhance security. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1478\u20131493.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"2060_CR86","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/TWC.2017.2768419","volume":"17","author":"M Hafez","year":"2017","unstructured":"Hafez, M., et al. (2017). Secure spatial multiple access using directional modulation. IEEE Transactions on Wireless Communications, 17, 563\u2013573.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2060_CR87","doi-asserted-by":"crossref","unstructured":"Li, Z., et al. (2015). Cooperative jamming for secure communications in MIMO cooperative cognitive radio networks. In Proceedings of the IEEE international conference on communications (ICC) (pp. 7609\u20137614).","DOI":"10.1109\/ICC.2015.7249543"},{"issue":"8","key":"2060_CR88","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1109\/JSTSP.2016.2600516","volume":"10","author":"L Li","year":"2016","unstructured":"Li, L., et al. (2016). Improving wireless physical layer security via exploiting co-channel interference. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1433\u20131448.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"2060_CR89","doi-asserted-by":"crossref","unstructured":"Ahn, S., et al. (2016). Enhancing physical-layer security in MISO wiretap channel with pilot-assisted channel estimation: Beamforming design for pilot jamming. In IEEE proceedings of the international conference on signal processing and communication systems (ICSPCS) (pp. 1\u20135).","DOI":"10.1109\/ICSPCS.2016.7843333"},{"issue":"7","key":"2060_CR90","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/TIFS.2016.2535906","volume":"11","author":"Q Yan","year":"2016","unstructured":"Yan, Q., et al. (2016). Jamming resilient communication using MIMO interference cancellation. IEEE Transactions on Information Forensics and Security, 11(7), 1486\u20131499.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2060_CR91","unstructured":"McCune, E. (2000). DSSS vs. FHSS narrowband interference performance issues. Magazine RF Signal Processing, 90\u2013104. \nhttp:\/\/rfdesign.com"},{"issue":"6","key":"2060_CR92","doi-asserted-by":"publisher","first-page":"e3095","DOI":"10.1002\/dac.3095","volume":"30","author":"I Javed","year":"2017","unstructured":"Javed, I., et al. (2017). Novel schemes for interference-resilient OFDM wireless communication. International Journal of Communication Systems, 30(6), e3095.","journal-title":"International Journal of Communication Systems"},{"key":"2060_CR93","doi-asserted-by":"crossref","unstructured":"Basciftci, Y., et al. (2015). Securing massive MIMO at the physical layer. In IEEE conference on communications and network security (CNS) (pp. 272\u2013280).","DOI":"10.1109\/CNS.2015.7346837"},{"key":"2060_CR94","doi-asserted-by":"crossref","unstructured":"Sodagari, S., & Clancy, T. (2012). Efficient jamming attacks on MIMO channels. In Proceedings of the IEEE international conference on communications (ICC) (pp. 852\u2013856). IEEE.","DOI":"10.1109\/ICC.2012.6364173"},{"issue":"1","key":"2060_CR95","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/TIFS.2017.2746007","volume":"13","author":"T Do","year":"2017","unstructured":"Do, T., et al. (2017). Jamming-resistant receivers for the massive MIMO uplink. IEEE Transactions on Information Forensics and Security, 13(1), 210\u2013223.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2060_CR96","doi-asserted-by":"crossref","unstructured":"Shen, W., et al. (2014). MCR decoding: A MIMO approach for defending against wireless jamming attacks. In IEEE Proceedings of the conference on communications and network security (CNS), (pp. 133\u2013138). IEEE.","DOI":"10.1109\/CNS.2014.6997478"},{"key":"2060_CR97","doi-asserted-by":"crossref","unstructured":"Shen, W., et al. (2015). No time to demodulate-fast physical layer verification of friendly jamming. In IEEE proceedings of the military communications conference (MILCOM) (pp. 653\u2013658). IEEE.","DOI":"10.1109\/MILCOM.2015.7357518"},{"key":"2060_CR98","doi-asserted-by":"crossref","unstructured":"Li, L., & Chigan, C. (2016). A virtual MIMO based anti-jamming strategy for cognitive radio networks. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1\u20136). IEEE.","DOI":"10.1109\/ICC.2016.7511336"},{"issue":"2","key":"2060_CR99","first-page":"2250","volume":"3","author":"P Chaturvedi","year":"2013","unstructured":"Chaturvedi, P., & Gupta, K. (2013). Detection and prevention of various types of jamming attacks in wireless networks. IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), 3(2), 2250\u20133501.","journal-title":"IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC)"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-02060-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-019-02060-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-02060-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T23:32:54Z","timestamp":1592004774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-019-02060-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,14]]},"references-count":99,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["2060"],"URL":"https:\/\/doi.org\/10.1007\/s11276-019-02060-0","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,14]]},"assertion":[{"value":"14 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}