[1]
D. Wyner: The wire-tap channel. Bell System Technology Journal, vol. 54, no. 8 (1975) , pp.1355-1387.
DOI: 10.1002/j.1538-7305.1975.tb02040.x
Google Scholar
[2]
L. Lai, H. E. Gamal, and H. V. Poor: The Wiretap Channel With Feedback: Encryption Over the Channel. IEEE Transactions on Information Theory, vol. 54, no. 11 (2008) , pp.5059-5067.
DOI: 10.1109/tit.2008.929914
Google Scholar
[3]
M. Bloch and J. Barros, Physical-Layer Security From Information Theory to Security Engineering. Cambridge, New York: Cambridge University Press (2011).
Google Scholar
[4]
Y. Liang, H. V. Poor, and S. S. (Shitz): Information Theoretic Security. Foundations and Trends in Communications and Information Theory, vol. 5, no. 4-5 ( 2009) , pp.355-580.
DOI: 10.1561/0100000036
Google Scholar
[5]
T. Liu and S. Shamai: A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Transactions on Information Theory, vol. 55, no. 6 (2009) , pp.2547-2553.
DOI: 10.1109/tit.2009.2018322
Google Scholar
[6]
S. Shafiee, N. Liu, and S. Ulukus: Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel. IEEE Transactions on Information Theory, vol. 55, no. 9 (2009) , pp.4033-4039.
DOI: 10.1109/tit.2009.2025549
Google Scholar
[7]
F. Oggier and B. Hassibi: The secrecy capacity of the MIMO wiretap channel. IEEE Transactions on Information Theory, vol. 57, no. 8 (2011) , pp.4961-4972.
DOI: 10.1109/tit.2011.2158487
Google Scholar
[8]
S. Goel and R. Negi: Guaranteeing Secrecy using Artificial Noise. IEEE Transactions on Wireless Communications, vol. 7, no. 6 (2008) , pp.2180-2189.
DOI: 10.1109/twc.2008.060848
Google Scholar
[9]
A. Mukherjee and A. L. Swindlehurst: Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI. IEEE Transactions on Signal Processing, vol. 59, no. 1 (2011) , pp.351-361.
DOI: 10.1109/tsp.2010.2078810
Google Scholar
[10]
W. -C. Liao, T. -H. Chang, W. -K. Ma, and C. -Y. Chi: QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificialnoise-aided approach. IEEE Transactions on Signal Processing, vol. 59, no. 3 (2011) , pp.1202-1216.
DOI: 10.1109/tsp.2010.2094610
Google Scholar
[11]
S. A. A. Fakoorian and A. L. Swindlehurst: MIMO interference channel with confidential messages: achievable secrecy rates and precoder design. IEEE Transactions on Information Forensics and Security, vol. 6, no. 3 (2011) , pp.640-649.
DOI: 10.1109/tifs.2011.2156788
Google Scholar
[12]
T. Gucluoglu and T. M. Duman: Performance analysis of transmit and receive antenna selection over flat fading channels. IEEE Transactions on Wireless Communications, vol. 7, no. 8 (2008) , pp.3056-3065.
DOI: 10.1109/twc.2008.061087
Google Scholar
[13]
H. Alves, R. D. Souza, and M. Debbah: Enhanced physical layer security through transmit antenna selection. in IEEE GlobeCOM 2011 (2011) , pp.879-883.
DOI: 10.1109/glocomw.2011.6162582
Google Scholar
[14]
H. Alves, R. D. Souza, M. Debbah, and M. Bennis: Performance of transmit antenna selection physical layer security schemes. IEEE Signal Processing Letters, vol. 19, no. 6 (2012) , pp.372-375.
DOI: 10.1109/lsp.2012.2195490
Google Scholar
[15]
N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings: Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels. IEEE Transactions on Communications, vol. 61, no. 1 (2013) , pp.144-154.
DOI: 10.1109/tcomm.2012.12.110670
Google Scholar
[16]
N. Yang, H. A. Suraweera, I. B. Collings, and Y. Chau: Physical Layer Security of TAS/MRC With Antenna Correlation. IEEE Transactions on Information Forensics and Security, vol. 8, no. 1 (2013) , pp.254-259.
DOI: 10.1109/tifs.2012.2223681
Google Scholar
[17]
B. Tan, K. Li, and K. The: Transmit Antenna Selection Systems: A Performance Comparison of Different Types of Receiver Schemes. IEEE Vehicular Technology Magazine, vol. 8, no. 3 (2013) , pp.104-112.
DOI: 10.1109/mvt.2013.2252300
Google Scholar
[18]
S. Yan, N. Yang, R. Malaney, and J. Yuan: Transmit Antenna Selection with Alamouti Scheme in MIMO Wiretap Channels. Information on http: /arxiv. org/abs/1303. 5157v1.
DOI: 10.1109/glocom.2013.6831148
Google Scholar