Enhancement of PLS Model of Massive MIMO by Detecting Eavesdrop Attacks and Improving the Secrecy Capacity of the System Based on Optimization Strategy

Physical layer security (PLS) is becoming an interesting subject since it guarantees to deliver the most consistent and secure communication in wireless systems in both present and future scenarios. The security can be obtained without considering any assumption over the computational power of eaves...

Full description

Saved in:
Bibliographic Details
Published in:Wireless personal communications Vol. 129; no. 2; pp. 1143 - 1159
Main Authors: Soni, Chanchal, Gupta, Namit
Format: Journal Article
Language:English
Published: New York Springer US 01.03.2023
Springer Nature B.V
Subjects:
ISSN:0929-6212, 1572-834X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Physical layer security (PLS) is becoming an interesting subject since it guarantees to deliver the most consistent and secure communication in wireless systems in both present and future scenarios. The security can be obtained without considering any assumption over the computational power of eavesdroppers. The massive MIMO that can render high power and spectrum effectiveness are discussed in detail in this work. The artificial noise injection zero-forcing pre-coding scheme is proposed to improve PLS of Massive MIMOs. The artificial noise is injected into the ZF pre-coder to destroy the eavesdropper’s performance. In addition, the detection of eavesdrop attack is analyzed based on hypothesis condition ( H 0 : no active attack present, H 1 : presence of active attack). The secrecy capacity of the system is improved by the intrusion of a game based optimization strategy. Here, the enhancement of secrecy rate is improved by the channel amplitude. The performance of the suggested model is evaluated in terms of secrecy rate, secrecy outage probability, and bit error rate and compared to existing approaches to enhance the efficacy of the suggested model.
AbstractList Physical layer security (PLS) is becoming an interesting subject since it guarantees to deliver the most consistent and secure communication in wireless systems in both present and future scenarios. The security can be obtained without considering any assumption over the computational power of eavesdroppers. The massive MIMO that can render high power and spectrum effectiveness are discussed in detail in this work. The artificial noise injection zero-forcing pre-coding scheme is proposed to improve PLS of Massive MIMOs. The artificial noise is injected into the ZF pre-coder to destroy the eavesdropper’s performance. In addition, the detection of eavesdrop attack is analyzed based on hypothesis condition (H0: no active attack present, H1: presence of active attack). The secrecy capacity of the system is improved by the intrusion of a game based optimization strategy. Here, the enhancement of secrecy rate is improved by the channel amplitude. The performance of the suggested model is evaluated in terms of secrecy rate, secrecy outage probability, and bit error rate and compared to existing approaches to enhance the efficacy of the suggested model.
Physical layer security (PLS) is becoming an interesting subject since it guarantees to deliver the most consistent and secure communication in wireless systems in both present and future scenarios. The security can be obtained without considering any assumption over the computational power of eavesdroppers. The massive MIMO that can render high power and spectrum effectiveness are discussed in detail in this work. The artificial noise injection zero-forcing pre-coding scheme is proposed to improve PLS of Massive MIMOs. The artificial noise is injected into the ZF pre-coder to destroy the eavesdropper’s performance. In addition, the detection of eavesdrop attack is analyzed based on hypothesis condition ( H 0 : no active attack present, H 1 : presence of active attack). The secrecy capacity of the system is improved by the intrusion of a game based optimization strategy. Here, the enhancement of secrecy rate is improved by the channel amplitude. The performance of the suggested model is evaluated in terms of secrecy rate, secrecy outage probability, and bit error rate and compared to existing approaches to enhance the efficacy of the suggested model.
Author Gupta, Namit
Soni, Chanchal
Author_xml – sequence: 1
  givenname: Chanchal
  surname: Soni
  fullname: Soni, Chanchal
  email: chanchal.soni36@gmail.com
  organization: Department of Electronics Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya (SVVV)
– sequence: 2
  givenname: Namit
  surname: Gupta
  fullname: Gupta, Namit
  organization: Department of Electrical and Electronics Engineering, Vaishnav Vidyapeeth Vishwavidyalaya (SVVV)
BookMark eNp9kd1uEzEQhS1UJNLCC3BliesF_-zG9mUJgUZKFKSAxJ3ln9l0S9a72G6k5UX6ujgJEhIXvRrN-HwzxzrX6CoMARB6S8l7Soj4kChlQlSE8YoSKknFXqAZbQSrJK9_XKEZUUxVc0bZK3Sd0gMhBVNshp6W4d4EBz2EjIcWf13v8GbwcDg1G5NSdwS8WW222E74E2RwuQt7vDRHSD4OI77N2bifCZvg8aof43A8ved7wDtwEdyEF2Y0rsvTaeN5PqUMPf5oEng8BLwdc9d3v03uSrPL0WTYT6_Ry9YcErz5W2_Q98_Lb4u7ar39slrcrivHqcpVK5wCML42zs4VFUo1lpLW13XjpYTaSmpt46yU3ANxrAVL6pZ7oSz3XgC_Qe8ue4vzX4-Qsn4YHmMoJzVnzVw2QjWyqORF5eKQUoRWlw-dDRe73UFTok8x6EsMusSgzzFoVlD2HzrGrjdxeh7iFygVcdhD_OfqGeoPJnOexw
CitedBy_id crossref_primary_10_1007_s11277_023_10523_z
crossref_primary_10_1109_JIOT_2025_3569716
crossref_primary_10_1088_1402_4896_ad67ab
crossref_primary_10_1007_s42835_024_02056_7
crossref_primary_10_1155_2023_9390660
Cites_doi 10.1002/dac.3237
10.1109/TWC.2015.2433291
10.1016/j.phycom.2019.100977
10.1109/JIOT.2017.2691352
10.1109/TVT.2020.3020086
10.3390/s20102753
10.3390/e19070349
10.1109/MCOM.2015.7355561
10.1109/TIFS.2015.2392564
10.1098/rspa.2020.0162
10.1109/TCOMM.2016.2606396
10.2174/2210327908666180514105607
10.1109/TIFS.2018.2883150
10.1007/s11277-020-07114-7
10.1109/TSP.2020.2986391
10.1109/TCOMM.2017.2730867
10.1049/iet-com.2019.0584
10.12720/jcm.15.8.633-638
10.1109/TIFS.2020.3002386
10.1109/JSYST.2020.3001068
10.1109/TVT.2022.3141055
10.1109/EIIS.2017.8298625
10.1109/IWCMC.2019.8766490
10.1109/SPAWC.2016.7536826
10.1109/PIMRC.2014.7136233
10.1109/ACSSC.2017.8335124
10.22266/ijies2020.1031.02
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.
DBID AAYXX
CITATION
8FE
8FG
ABJCF
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L6V
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
DOI 10.1007/s11277-023-10180-2
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
ProQuest Engineering Collection
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Advanced Technologies & Aerospace Collection
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Computer Science Database

Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Journalism & Communications
Engineering
EISSN 1572-834X
EndPage 1159
ExternalDocumentID 10_1007_s11277_023_10180_2
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29R
29~
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEGXH
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARCEE
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BGNMA
BSONS
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EDO
EIOEI
EJD
ESBYG
FD6
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P9P
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RIG
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCV
SDH
SDM
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
TUS
U2A
U5U
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7X
Z7Z
Z81
Z83
Z88
Z8M
Z8N
Z8R
Z8T
Z8U
Z8W
Z92
ZMTXR
_50
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABJCF
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFFHD
AFHIU
AFKRA
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ARAPS
ATHPR
AYFIA
BENPR
BGLVJ
CCPQU
CITATION
HCIFZ
K7-
M7S
PHGZM
PHGZT
PQGLB
PTHSS
8FE
8FG
AZQEC
DWQXO
GNUQQ
JQ2
L6V
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c319t-f7c9eead4acb6917995b10fd445d88e4b81bb5cb883de0c2feb04f3d79b3dd7e3
IEDL.DBID RSV
ISICitedReferencesCount 7
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000939538500003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0929-6212
IngestDate Sun Nov 30 05:06:04 EST 2025
Tue Nov 18 21:44:22 EST 2025
Sat Nov 29 05:18:28 EST 2025
Fri Feb 21 02:45:13 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords Physical layer security
Secrecy rate
Game optimization
Massive MIMO
Eavesdrop attack
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-f7c9eead4acb6917995b10fd445d88e4b81bb5cb883de0c2feb04f3d79b3dd7e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 3256857958
PQPubID 2043826
PageCount 17
ParticipantIDs proquest_journals_3256857958
crossref_citationtrail_10_1007_s11277_023_10180_2
crossref_primary_10_1007_s11277_023_10180_2
springer_journals_10_1007_s11277_023_10180_2
PublicationCentury 2000
PublicationDate 20230300
2023-03-00
20230301
PublicationDateYYYYMMDD 2023-03-01
PublicationDate_xml – month: 3
  year: 2023
  text: 20230300
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Wireless personal communications
PublicationTitleAbbrev Wireless Pers Commun
PublicationYear 2023
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Salem, Aziz, Alias (CR16) 2020; 15
Yang, Zhang, Cheng, Yang (CR29) 2018; 14
Xiong, Liang, Li, Gong (CR26) 2015; 10
Chataut, Akl (CR1) 2020; 20
Liu, Du, Sun (CR4) 2016; 66
Liu, Lin, Lin, Hong, Jorswieck (CR9) 2015; 53
CR19
Lu, Yang, Guan, Cai (CR22) 2020; 69
CR14
Singh, Trivedi (CR21) 2020; 39
CR13
Hao, Ni, Li, Hou (CR2) 2017; 65
Dehghani, Montazeri, Saremi, Dehghani, Malik, Al-Haddad, Guerrero (CR25) 2020; 13
Choi, Joung, Jung (CR28) 2020; 15
Abumarshoud, Chen, Islim, Haas (CR27) 2020; 476
Gupta, Jha, Devi (CR6) 2018; 8
Al-Hraishawi, AmarasuriyaArumaBaduge, Schaefer (CR12) 2017; 19
Singh, Trivedi (CR20) 2020; 112
CR8
CR7
You, Xiong, Zappone, Wang, Gao (CR3) 2020; 68
Gupta, Jha, Jain (CR5) 2017; 30
Shen, Xu, Xia, Xie, Zhang (CR23) 2020; 15
Yang, Guo, Huang, Duong, Zhang (CR15) 2016; 64
CR24
Chen, Lei, Zhang, Yuen (CR10) 2015; 14
Rawat, White, Parwez, Bajracharya, Song (CR11) 2017; 4
IsmayilSiyad, Tamilselvan (CR18) 2021; 13
Pandey, Yadav (CR17) 2020; 14
M Yang (10180_CR15) 2016; 64
A Pandey (10180_CR17) 2020; 14
P Singh (10180_CR21) 2020; 39
10180_CR7
KR Singh (10180_CR20) 2020; 112
10180_CR19
H Abumarshoud (10180_CR27) 2020; 476
A Gupta (10180_CR5) 2017; 30
X Lu (10180_CR22) 2020; 69
10180_CR8
Q Xiong (10180_CR26) 2015; 10
C IsmayilSiyad (10180_CR18) 2021; 13
Z Shen (10180_CR23) 2020; 15
10180_CR14
10180_CR13
A Gupta (10180_CR6) 2018; 8
H Al-Hraishawi (10180_CR12) 2017; 19
J Choi (10180_CR28) 2020; 15
MA Salem (10180_CR16) 2020; 15
R Chataut (10180_CR1) 2020; 20
Y Hao (10180_CR2) 2017; 65
L You (10180_CR3) 2020; 68
X Chen (10180_CR10) 2015; 14
M Dehghani (10180_CR25) 2020; 13
10180_CR24
T Yang (10180_CR29) 2018; 14
Z Liu (10180_CR4) 2016; 66
TY Liu (10180_CR9) 2015; 53
DB Rawat (10180_CR11) 2017; 4
References_xml – volume: 30
  issue: 10
  year: 2017
  ident: CR5
  article-title: Attack modeling and intrusion detection system for 5G wireless communication network
  publication-title: International Journal of Communication Systems
  doi: 10.1002/dac.3237
– volume: 14
  start-page: 5135
  issue: 9
  year: 2015
  end-page: 5146
  ident: CR10
  article-title: Large-scale MIMO relaying techniques for physical layer security: AF or DF?
  publication-title: IEEE Transactions on Wireless Communications
  doi: 10.1109/TWC.2015.2433291
– ident: CR14
– volume: 13
  start-page: 1
  year: 2021
  end-page: 12
  ident: CR18
  article-title: Chaotic deep neural network based physical layer key generation for massive MIMO
  publication-title: International Journal of Information Technology
– volume: 39
  year: 2020
  ident: CR21
  article-title: NOMA and massive MIMO assisted physical layer security using artificial noise pre-coding
  publication-title: Physical Communication
  doi: 10.1016/j.phycom.2019.100977
– volume: 4
  start-page: 1987
  issue: 6
  year: 2017
  end-page: 1993
  ident: CR11
  article-title: Evaluating secrecy outage of physical layer security in large-scale MIMO wireless communications for cyber-physical systems
  publication-title: IEEE Internet of Things Journal
  doi: 10.1109/JIOT.2017.2691352
– volume: 69
  start-page: 13045
  issue: 11
  year: 2020
  end-page: 13059
  ident: CR22
  article-title: DCE-based secure transmission for massive MIMO relay system against active eavesdropper
  publication-title: IEEE Transactions on Vehicular Technology
  doi: 10.1109/TVT.2020.3020086
– volume: 20
  start-page: 2753
  issue: 10
  year: 2020
  ident: CR1
  article-title: Massive MIMO systems for 5G and beyond networks—Overview, recent trends, challenges, and future research direction
  publication-title: Sensors
  doi: 10.3390/s20102753
– volume: 19
  start-page: 349
  issue: 7
  year: 2017
  ident: CR12
  article-title: Artificial noise-aided physical layer security in underlay cognitive massive MIMO systems with pilot contamination
  publication-title: Entropy
  doi: 10.3390/e19070349
– ident: CR8
– volume: 53
  start-page: 19
  issue: 12
  year: 2015
  end-page: 25
  ident: CR9
  article-title: To avoid or not to avoid CSI leakage in physical layer secret communication systems
  publication-title: IEEE Communications Magazine
  doi: 10.1109/MCOM.2015.7355561
– volume: 10
  start-page: 932
  issue: 5
  year: 2015
  end-page: 940
  ident: CR26
  article-title: An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2015.2392564
– volume: 476
  start-page: 20200162
  issue: 2242
  year: 2020
  ident: CR27
  article-title: Optical wireless communications for cyber-secure ubiquitous wireless networks
  publication-title: Proceedings of the Royal Society A
  doi: 10.1098/rspa.2020.0162
– volume: 66
  start-page: 4453
  issue: 5
  year: 2016
  end-page: 4457
  ident: CR4
  article-title: Energy and spectral efficiency tradeoff for massive MIMO systems with transmit antenna selection
  publication-title: IEEE Transactions on Vehicular Technology
– volume: 64
  start-page: 5189
  issue: 12
  year: 2016
  end-page: 5202
  ident: CR15
  article-title: Physical layer security with threshold-based multi-user scheduling in multi-antenna wireless networks
  publication-title: IEEE Transactions on Communications
  doi: 10.1109/TCOMM.2016.2606396
– volume: 8
  start-page: 92
  issue: 2
  year: 2018
  end-page: 99
  ident: CR6
  article-title: Security architecture of 5g wireless communication network
  publication-title: International Journal of Sensors Wireless Communications and Control
  doi: 10.2174/2210327908666180514105607
– ident: CR19
– volume: 14
  start-page: 1610
  issue: 6
  year: 2018
  end-page: 1623
  ident: CR29
  article-title: Secure massive MIMO under imperfect CSI: Performance analysis and channel prediction
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2018.2883150
– volume: 112
  start-page: 1537
  issue: 3
  year: 2020
  end-page: 1547
  ident: CR20
  article-title: Physical layer security for wireless powered massive MIMO decode and forward relay systems with hardware impairments: performance analysis
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-020-07114-7
– volume: 68
  start-page: 2645
  year: 2020
  end-page: 2659
  ident: CR3
  article-title: Spectral efficiency and energy efficiency tradeoff in massive MIMO downlink transmission with statistical CSIT
  publication-title: IEEE Transactions on Signal Processing
  doi: 10.1109/TSP.2020.2986391
– ident: CR13
– volume: 65
  start-page: 4720
  issue: 11
  year: 2017
  end-page: 4733
  ident: CR2
  article-title: On the energy and spectral efficiency tradeoff in massive MIMO-enabled HetNets with capacity-constrained backhaul links
  publication-title: IEEE Transactions on Communications
  doi: 10.1109/TCOMM.2017.2730867
– volume: 14
  start-page: 95
  issue: 1
  year: 2020
  end-page: 104
  ident: CR17
  article-title: Physical layer security in cooperative amplify-and-forward relay networks over mixed Nakagami-m and double Nakagami-m fading channels: Performance evaluation and optimization
  publication-title: IET Communications
  doi: 10.1049/iet-com.2019.0584
– ident: CR7
– volume: 15
  start-page: 633
  issue: 8
  year: 2020
  end-page: 638
  ident: CR16
  article-title: Cooperative relay transmission under physical layer security for non-orthogonal networks
  publication-title: The Journal of Communication
  doi: 10.12720/jcm.15.8.633-638
– volume: 15
  start-page: 3760
  year: 2020
  end-page: 3774
  ident: CR23
  article-title: Spatial sparsity based secure transmission strategy for massive MIMO systems against simultaneous jamming and eavesdropping
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2020.3002386
– ident: CR24
– volume: 13
  start-page: 10
  year: 2020
  ident: CR25
  article-title: HOGO: Hide objects game optimization
  publication-title: International Journal of Intelligent Systems
– volume: 15
  start-page: 3336
  year: 2020
  end-page: 3347
  ident: CR28
  article-title: Space–time line code for enhancing physical layer security of multi-user MIMO uplink transmission
  publication-title: IEEE Systems Journal
  doi: 10.1109/JSYST.2020.3001068
– volume: 53
  start-page: 19
  issue: 12
  year: 2015
  ident: 10180_CR9
  publication-title: IEEE Communications Magazine
  doi: 10.1109/MCOM.2015.7355561
– volume: 30
  issue: 10
  year: 2017
  ident: 10180_CR5
  publication-title: International Journal of Communication Systems
  doi: 10.1002/dac.3237
– ident: 10180_CR19
  doi: 10.1109/TVT.2022.3141055
– volume: 14
  start-page: 5135
  issue: 9
  year: 2015
  ident: 10180_CR10
  publication-title: IEEE Transactions on Wireless Communications
  doi: 10.1109/TWC.2015.2433291
– ident: 10180_CR14
  doi: 10.1109/EIIS.2017.8298625
– volume: 14
  start-page: 95
  issue: 1
  year: 2020
  ident: 10180_CR17
  publication-title: IET Communications
  doi: 10.1049/iet-com.2019.0584
– volume: 14
  start-page: 1610
  issue: 6
  year: 2018
  ident: 10180_CR29
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2018.2883150
– ident: 10180_CR8
  doi: 10.1109/IWCMC.2019.8766490
– volume: 15
  start-page: 3760
  year: 2020
  ident: 10180_CR23
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2020.3002386
– volume: 15
  start-page: 633
  issue: 8
  year: 2020
  ident: 10180_CR16
  publication-title: The Journal of Communication
  doi: 10.12720/jcm.15.8.633-638
– ident: 10180_CR13
  doi: 10.1109/SPAWC.2016.7536826
– volume: 39
  year: 2020
  ident: 10180_CR21
  publication-title: Physical Communication
  doi: 10.1016/j.phycom.2019.100977
– volume: 112
  start-page: 1537
  issue: 3
  year: 2020
  ident: 10180_CR20
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-020-07114-7
– ident: 10180_CR7
  doi: 10.1109/PIMRC.2014.7136233
– ident: 10180_CR24
  doi: 10.1109/ACSSC.2017.8335124
– volume: 8
  start-page: 92
  issue: 2
  year: 2018
  ident: 10180_CR6
  publication-title: International Journal of Sensors Wireless Communications and Control
  doi: 10.2174/2210327908666180514105607
– volume: 13
  start-page: 1
  year: 2021
  ident: 10180_CR18
  publication-title: International Journal of Information Technology
– volume: 13
  start-page: 10
  year: 2020
  ident: 10180_CR25
  publication-title: International Journal of Intelligent Systems
  doi: 10.22266/ijies2020.1031.02
– volume: 68
  start-page: 2645
  year: 2020
  ident: 10180_CR3
  publication-title: IEEE Transactions on Signal Processing
  doi: 10.1109/TSP.2020.2986391
– volume: 66
  start-page: 4453
  issue: 5
  year: 2016
  ident: 10180_CR4
  publication-title: IEEE Transactions on Vehicular Technology
– volume: 10
  start-page: 932
  issue: 5
  year: 2015
  ident: 10180_CR26
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2015.2392564
– volume: 4
  start-page: 1987
  issue: 6
  year: 2017
  ident: 10180_CR11
  publication-title: IEEE Internet of Things Journal
  doi: 10.1109/JIOT.2017.2691352
– volume: 19
  start-page: 349
  issue: 7
  year: 2017
  ident: 10180_CR12
  publication-title: Entropy
  doi: 10.3390/e19070349
– volume: 69
  start-page: 13045
  issue: 11
  year: 2020
  ident: 10180_CR22
  publication-title: IEEE Transactions on Vehicular Technology
  doi: 10.1109/TVT.2020.3020086
– volume: 476
  start-page: 20200162
  issue: 2242
  year: 2020
  ident: 10180_CR27
  publication-title: Proceedings of the Royal Society A
  doi: 10.1098/rspa.2020.0162
– volume: 20
  start-page: 2753
  issue: 10
  year: 2020
  ident: 10180_CR1
  publication-title: Sensors
  doi: 10.3390/s20102753
– volume: 64
  start-page: 5189
  issue: 12
  year: 2016
  ident: 10180_CR15
  publication-title: IEEE Transactions on Communications
  doi: 10.1109/TCOMM.2016.2606396
– volume: 65
  start-page: 4720
  issue: 11
  year: 2017
  ident: 10180_CR2
  publication-title: IEEE Transactions on Communications
  doi: 10.1109/TCOMM.2017.2730867
– volume: 15
  start-page: 3336
  year: 2020
  ident: 10180_CR28
  publication-title: IEEE Systems Journal
  doi: 10.1109/JSYST.2020.3001068
SSID ssj0010092
Score 2.339943
Snippet Physical layer security (PLS) is becoming an interesting subject since it guarantees to deliver the most consistent and secure communication in wireless...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1143
SubjectTerms Bit error rate
Communications Engineering
Computer Communication Networks
Eavesdropping
Effectiveness
Energy consumption
Engineering
MIMO communication
Networks
Neural networks
Optimization
Pilots
Secrecy aspects
Security
Signal,Image and Speech Processing
Strategy
Systems design
Unmanned aerial vehicles
Wireless communications
SummonAdditionalLinks – databaseName: Advanced Technologies & Aerospace Database
  dbid: P5Z
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEA6-DnrwLb6Zg3jRYp-2OYmPFQVXF1QQL6V5FBe0XbdV2F_i33Umm91VQS8e2yahkC8zXzKZbxjbkZknteDayXWMGxSVhbjmOHdCZAN-zDWPeWaKTcTX18nDA2_ZA7fKXqsc2ERjqFUp6Yz8IEDfnEQxj5KjzqtDVaMoumpLaIyzSc9Hro94bkWPwygCCQoZrT264oE22ibN9FPnPApeosdyjIaV4393TCO2-SNAavzO-dx__3iezVrGCcd9iCywMV0sspkvOoSLbMM2alcvsAvfckaqJfbRKJ4IG3SOCGUOratboBJqz_TQRPKNBhOal80bED040xSVwFGhkb3rSnXLDhzXNWXyQ1YoGB5iADJPuCXSKntwii5b4n6ARjTvjb40nKCLVVAWcIOG7cVmjIIV1O0ts_vzxt3phWPrOTgSF3rt5LHkGpEbZlIcciNFJzw3V2EYqSTRoUAKLSIpkiRQ2pV-roUb5oGKuQiUinWwwiaKstCrDHDfHkqpEVaZxg0mRxbrciVcfOUrT_lrzBtMZiqt2DnV3HhORzLNBIAUAZAaAKTYZ2_Yp9OX-viz9eZg1lO77Kt0NOVrbH-Am9Hn30db_3u0DTZNZe77d9822UTdfdNbbEq-1-2qu21A_wlITQkr
  priority: 102
  providerName: ProQuest
Title Enhancement of PLS Model of Massive MIMO by Detecting Eavesdrop Attacks and Improving the Secrecy Capacity of the System Based on Optimization Strategy
URI https://link.springer.com/article/10.1007/s11277-023-10180-2
https://www.proquest.com/docview/3256857958
Volume 129
WOSCitedRecordID wos000939538500003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 1572-834X
  dateEnd: 20241214
  omitProxy: false
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: P5Z
  dateStart: 20230101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1572-834X
  dateEnd: 20241214
  omitProxy: false
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: K7-
  dateStart: 20230101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Engineering Database
  customDbUrl:
  eissn: 1572-834X
  dateEnd: 20241214
  omitProxy: false
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: M7S
  dateStart: 20230101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1572-834X
  dateEnd: 20241214
  omitProxy: false
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: BENPR
  dateStart: 20230101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: Springer Journals New Starts & Take-Overs Collection
  customDbUrl:
  eissn: 1572-834X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0010092
  issn: 0929-6212
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fT9swED4x2MN42IBtggHVPUy8bJGSJsHxI7CiIdZS0W1Ce4niH9GQIEVNQOpfsn93d67TwjQmjZdIcWwrks93n3133wG810WkrZI2KK2gA4opEtpzUgYJoYGukFYKWbhiE2IwyC4u5NAnhdVttHvrknSaepHsFrG7kWxM4FinAlK8K0xewnULzkff574DphFyDHsc2EGa2afK_H2Oh-ZogTH_cIs6a3P86mn_uQYvPbrEg5k4rMOSrTZg9R7n4AZs-06X9TXu4YP8kPo1_OpVP1kO-M4QxyUOv4yQy6Vd8UufgDYpR-yf9M9QTfGTZQ8EzYq94s7WZjK-wYOm4ax9LCqD8wsLJJSJIwaoeopHZJ41YX-e0bU7Lmk8JHNqcFzhGSmxa58dip48d_oGvh33vh59DnzthkDTpm6CUmhpSUqTQqt96WjnVBSWJklSk2U2UQSXVapVlsXGhrpbWhUmZWyEVLExwsZvYbkaV3YTkM7oidaWRKiwdJiUhFhDaVRITV0Tme4WRO0S5toTm3N9jat8QcnMS5LTkuRuSXIa82E-5mZG6_HP3jutZOR-i9d5TGAxS4VMsy342ErC4vPjs737v-7b8IJL3M_i3nZguZnc2l14ru-ay3rSgZXD3mB43oFnpyLocOTqiJ7D9EfHbYrf2ncDIQ
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VggQceBQQpQXmAFzAwk-8e0CotKkaNUkjtUgVF-N9WFRq7RCbovwS_gW_kZmNnVAkeuuBo19zWH_z2tn5BuCFzgNtlbReYVNKUEwek85J6cUUDYSptDKVuRs2kY5G4vhYjlfgV9cLw8cqO5voDLWpNO-Rv43IN4sklYn4MPnm8dQorq52IzTmsNi3sx-UstXv-zv0f1-G4W7vaHvPa6cKeJrg1nhFqqWl9Ytzrd5JR4imAr8wcZwYIWysKJBTiVZCRMb6Oiys8uMiMqlUkTGpjUjuNbhOYYRkQzBOPi-qFkxg5Lj9-EgJ-YS2SWfeqhdwsZQ8pOc4s7zwoiNcRrd_FWSdn9u9-7-t0D2400bUuDVXgfuwYss1uP0Hz-IabLQvndRn-Aov9MTUD-Bnr_zK2Od9UqwKHA8OkUfEnfLFkJILcgg47A8PUM1wx3LVhaRiLz-3tZlWE9xqGmYqwLw0uNikQYqs8ZCDcj3DbQpJNOU7LNHdd_zZ-JFCCINViQdkuM_ajlhsCYNnD-HTlazbI1gtq9I-BhRCxFpbUpvcUgItKUr3pVE-3QpNYMJ1CDrwZLolc-eZIqfZkoaaAZcR4DIHuIy-eb34ZjKnMrn07c0OZVlr1upsCbF1eNPhdPn439KeXC7tOdzcOxoOskF_tL8Bt0JWE3fObxNWm-l3-xRu6PPmpJ4-cwqH8OWq8fsbNQxp8g
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1ZS8NAEF5ERfTBW7ydB_FFgzm2Jvvo0aJoa6EqvoXsERQ0LU0U-kv8u85s01ZFBfExm90lMNc3mZ1vGdtViaeMFMZJTYgJik442pwQDkc04IfCiFAk9rKJsNGI7u9F80MXvz3tPihJ9nsaiKUpKw47Oj0cNb55VHrEeONYBioHnfAEJzY0ytdbd8M6AlEKWbY9OuSBXrpsm_l-j8-haYQ3v5RIbeSpzf3_m-fZbIk64bivJgtszGSLbOYDF-Ei2ygnPebPsAef-kbyJfZWzR5IP-hfIrRTaF61gK5Re6KHOgJwdJpQv6hfg-zBmaHKBO4K1eTV5Lrb7sBxUVA3PySZhuGPDED0CS0CrqoHpxi2FeYEtKMdtxzTcIJhVkM7g2t0bs9l1yiUpLq9ZXZbq96cnjvlnQ6OQmMvnDRUwqD28kTJI2Hp6KTnpprzio4iwyXCaFlRMooCbVzlp0a6PA10KGSgdWiCFTaetTOzygBzd66UQdVKDCaZApGsK7R0ccjXnvbXmDcQZ6xKwnO6d-MpHlE1k0hiFElsRRLjmv3hmk6f7uPX2ZsDLYlL08_jAEFkVAlFJVpjBwOtGL3-ebf1v03fYVPNs1p8ddG43GDTPumVPRq3ycaL7ovZYpPqtXjMu9vWIt4Bfi4Khw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enhancement+of+PLS+Model+of+Massive+MIMO+by+Detecting+Eavesdrop+Attacks+and+Improving+the+Secrecy+Capacity+of+the+System+Based+on+Optimization+Strategy&rft.jtitle=Wireless+personal+communications&rft.au=Soni%2C+Chanchal&rft.au=Gupta%2C+Namit&rft.date=2023-03-01&rft.pub=Springer+US&rft.issn=0929-6212&rft.eissn=1572-834X&rft.volume=129&rft.issue=2&rft.spage=1143&rft.epage=1159&rft_id=info:doi/10.1007%2Fs11277-023-10180-2&rft.externalDocID=10_1007_s11277_023_10180_2
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0929-6212&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0929-6212&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0929-6212&client=summon