Enhancement of PLS Model of Massive MIMO by Detecting Eavesdrop Attacks and Improving the Secrecy Capacity of the System Based on Optimization Strategy
Physical layer security (PLS) is becoming an interesting subject since it guarantees to deliver the most consistent and secure communication in wireless systems in both present and future scenarios. The security can be obtained without considering any assumption over the computational power of eaves...
Saved in:
| Published in: | Wireless personal communications Vol. 129; no. 2; pp. 1143 - 1159 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
Springer US
01.03.2023
Springer Nature B.V |
| Subjects: | |
| ISSN: | 0929-6212, 1572-834X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Physical layer security (PLS) is becoming an interesting subject since it guarantees to deliver the most consistent and secure communication in wireless systems in both present and future scenarios. The security can be obtained without considering any assumption over the computational power of eavesdroppers. The massive MIMO that can render high power and spectrum effectiveness are discussed in detail in this work. The artificial noise injection zero-forcing pre-coding scheme is proposed to improve PLS of Massive MIMOs. The artificial noise is injected into the ZF pre-coder to destroy the eavesdropper’s performance. In addition, the detection of eavesdrop attack is analyzed based on hypothesis condition (
H
0
: no active attack present,
H
1
: presence of active attack). The secrecy capacity of the system is improved by the intrusion of a game based optimization strategy. Here, the enhancement of secrecy rate is improved by the channel amplitude. The performance of the suggested model is evaluated in terms of secrecy rate, secrecy outage probability, and bit error rate and compared to existing approaches to enhance the efficacy of the suggested model. |
|---|---|
| AbstractList | Physical layer security (PLS) is becoming an interesting subject since it guarantees to deliver the most consistent and secure communication in wireless systems in both present and future scenarios. The security can be obtained without considering any assumption over the computational power of eavesdroppers. The massive MIMO that can render high power and spectrum effectiveness are discussed in detail in this work. The artificial noise injection zero-forcing pre-coding scheme is proposed to improve PLS of Massive MIMOs. The artificial noise is injected into the ZF pre-coder to destroy the eavesdropper’s performance. In addition, the detection of eavesdrop attack is analyzed based on hypothesis condition (H0: no active attack present, H1: presence of active attack). The secrecy capacity of the system is improved by the intrusion of a game based optimization strategy. Here, the enhancement of secrecy rate is improved by the channel amplitude. The performance of the suggested model is evaluated in terms of secrecy rate, secrecy outage probability, and bit error rate and compared to existing approaches to enhance the efficacy of the suggested model. Physical layer security (PLS) is becoming an interesting subject since it guarantees to deliver the most consistent and secure communication in wireless systems in both present and future scenarios. The security can be obtained without considering any assumption over the computational power of eavesdroppers. The massive MIMO that can render high power and spectrum effectiveness are discussed in detail in this work. The artificial noise injection zero-forcing pre-coding scheme is proposed to improve PLS of Massive MIMOs. The artificial noise is injected into the ZF pre-coder to destroy the eavesdropper’s performance. In addition, the detection of eavesdrop attack is analyzed based on hypothesis condition ( H 0 : no active attack present, H 1 : presence of active attack). The secrecy capacity of the system is improved by the intrusion of a game based optimization strategy. Here, the enhancement of secrecy rate is improved by the channel amplitude. The performance of the suggested model is evaluated in terms of secrecy rate, secrecy outage probability, and bit error rate and compared to existing approaches to enhance the efficacy of the suggested model. |
| Author | Gupta, Namit Soni, Chanchal |
| Author_xml | – sequence: 1 givenname: Chanchal surname: Soni fullname: Soni, Chanchal email: chanchal.soni36@gmail.com organization: Department of Electronics Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya (SVVV) – sequence: 2 givenname: Namit surname: Gupta fullname: Gupta, Namit organization: Department of Electrical and Electronics Engineering, Vaishnav Vidyapeeth Vishwavidyalaya (SVVV) |
| BookMark | eNp9kd1uEzEQhS1UJNLCC3BliesF_-zG9mUJgUZKFKSAxJ3ln9l0S9a72G6k5UX6ujgJEhIXvRrN-HwzxzrX6CoMARB6S8l7Soj4kChlQlSE8YoSKknFXqAZbQSrJK9_XKEZUUxVc0bZK3Sd0gMhBVNshp6W4d4EBz2EjIcWf13v8GbwcDg1G5NSdwS8WW222E74E2RwuQt7vDRHSD4OI77N2bifCZvg8aof43A8ved7wDtwEdyEF2Y0rsvTaeN5PqUMPf5oEng8BLwdc9d3v03uSrPL0WTYT6_Ry9YcErz5W2_Q98_Lb4u7ar39slrcrivHqcpVK5wCML42zs4VFUo1lpLW13XjpYTaSmpt46yU3ANxrAVL6pZ7oSz3XgC_Qe8ue4vzX4-Qsn4YHmMoJzVnzVw2QjWyqORF5eKQUoRWlw-dDRe73UFTok8x6EsMusSgzzFoVlD2HzrGrjdxeh7iFygVcdhD_OfqGeoPJnOexw |
| CitedBy_id | crossref_primary_10_1007_s11277_023_10523_z crossref_primary_10_1109_JIOT_2025_3569716 crossref_primary_10_1088_1402_4896_ad67ab crossref_primary_10_1007_s42835_024_02056_7 crossref_primary_10_1155_2023_9390660 |
| Cites_doi | 10.1002/dac.3237 10.1109/TWC.2015.2433291 10.1016/j.phycom.2019.100977 10.1109/JIOT.2017.2691352 10.1109/TVT.2020.3020086 10.3390/s20102753 10.3390/e19070349 10.1109/MCOM.2015.7355561 10.1109/TIFS.2015.2392564 10.1098/rspa.2020.0162 10.1109/TCOMM.2016.2606396 10.2174/2210327908666180514105607 10.1109/TIFS.2018.2883150 10.1007/s11277-020-07114-7 10.1109/TSP.2020.2986391 10.1109/TCOMM.2017.2730867 10.1049/iet-com.2019.0584 10.12720/jcm.15.8.633-638 10.1109/TIFS.2020.3002386 10.1109/JSYST.2020.3001068 10.1109/TVT.2022.3141055 10.1109/EIIS.2017.8298625 10.1109/IWCMC.2019.8766490 10.1109/SPAWC.2016.7536826 10.1109/PIMRC.2014.7136233 10.1109/ACSSC.2017.8335124 10.22266/ijies2020.1031.02 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. |
| DBID | AAYXX CITATION 8FE 8FG ABJCF AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS |
| DOI | 10.1007/s11277-023-10180-2 |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Computer Science Database |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Journalism & Communications Engineering |
| EISSN | 1572-834X |
| EndPage | 1159 |
| ExternalDocumentID | 10_1007_s11277_023_10180_2 |
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29R 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEGXH AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARCEE ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BGNMA BSONS CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EDO EIOEI EJD ESBYG FD6 FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P9P PF0 PT4 PT5 QOK QOS R4E R89 R9I RHV RIG RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCV SDH SDM SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC TUS U2A U5U UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7X Z7Z Z81 Z83 Z88 Z8M Z8N Z8R Z8T Z8U Z8W Z92 ZMTXR _50 ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABJCF ABRTQ ACSTC ADHKG AEZWR AFDZB AFFHD AFHIU AFKRA AFOHR AGQPQ AHPBZ AHWEU AIXLP ARAPS ATHPR AYFIA BENPR BGLVJ CCPQU CITATION HCIFZ K7- M7S PHGZM PHGZT PQGLB PTHSS 8FE 8FG AZQEC DWQXO GNUQQ JQ2 L6V P62 PKEHL PQEST PQQKQ PQUKI PRINS |
| ID | FETCH-LOGICAL-c319t-f7c9eead4acb6917995b10fd445d88e4b81bb5cb883de0c2feb04f3d79b3dd7e3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 7 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000939538500003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0929-6212 |
| IngestDate | Sun Nov 30 05:06:04 EST 2025 Tue Nov 18 21:44:22 EST 2025 Sat Nov 29 05:18:28 EST 2025 Fri Feb 21 02:45:13 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Keywords | Physical layer security Secrecy rate Game optimization Massive MIMO Eavesdrop attack |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-f7c9eead4acb6917995b10fd445d88e4b81bb5cb883de0c2feb04f3d79b3dd7e3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 3256857958 |
| PQPubID | 2043826 |
| PageCount | 17 |
| ParticipantIDs | proquest_journals_3256857958 crossref_citationtrail_10_1007_s11277_023_10180_2 crossref_primary_10_1007_s11277_023_10180_2 springer_journals_10_1007_s11277_023_10180_2 |
| PublicationCentury | 2000 |
| PublicationDate | 20230300 2023-03-00 20230301 |
| PublicationDateYYYYMMDD | 2023-03-01 |
| PublicationDate_xml | – month: 3 year: 2023 text: 20230300 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Dordrecht |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Wireless personal communications |
| PublicationTitleAbbrev | Wireless Pers Commun |
| PublicationYear | 2023 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Salem, Aziz, Alias (CR16) 2020; 15 Yang, Zhang, Cheng, Yang (CR29) 2018; 14 Xiong, Liang, Li, Gong (CR26) 2015; 10 Chataut, Akl (CR1) 2020; 20 Liu, Du, Sun (CR4) 2016; 66 Liu, Lin, Lin, Hong, Jorswieck (CR9) 2015; 53 CR19 Lu, Yang, Guan, Cai (CR22) 2020; 69 CR14 Singh, Trivedi (CR21) 2020; 39 CR13 Hao, Ni, Li, Hou (CR2) 2017; 65 Dehghani, Montazeri, Saremi, Dehghani, Malik, Al-Haddad, Guerrero (CR25) 2020; 13 Choi, Joung, Jung (CR28) 2020; 15 Abumarshoud, Chen, Islim, Haas (CR27) 2020; 476 Gupta, Jha, Devi (CR6) 2018; 8 Al-Hraishawi, AmarasuriyaArumaBaduge, Schaefer (CR12) 2017; 19 Singh, Trivedi (CR20) 2020; 112 CR8 CR7 You, Xiong, Zappone, Wang, Gao (CR3) 2020; 68 Gupta, Jha, Jain (CR5) 2017; 30 Shen, Xu, Xia, Xie, Zhang (CR23) 2020; 15 Yang, Guo, Huang, Duong, Zhang (CR15) 2016; 64 CR24 Chen, Lei, Zhang, Yuen (CR10) 2015; 14 Rawat, White, Parwez, Bajracharya, Song (CR11) 2017; 4 IsmayilSiyad, Tamilselvan (CR18) 2021; 13 Pandey, Yadav (CR17) 2020; 14 M Yang (10180_CR15) 2016; 64 A Pandey (10180_CR17) 2020; 14 P Singh (10180_CR21) 2020; 39 10180_CR7 KR Singh (10180_CR20) 2020; 112 10180_CR19 H Abumarshoud (10180_CR27) 2020; 476 A Gupta (10180_CR5) 2017; 30 X Lu (10180_CR22) 2020; 69 10180_CR8 Q Xiong (10180_CR26) 2015; 10 C IsmayilSiyad (10180_CR18) 2021; 13 Z Shen (10180_CR23) 2020; 15 10180_CR14 10180_CR13 A Gupta (10180_CR6) 2018; 8 H Al-Hraishawi (10180_CR12) 2017; 19 J Choi (10180_CR28) 2020; 15 MA Salem (10180_CR16) 2020; 15 R Chataut (10180_CR1) 2020; 20 Y Hao (10180_CR2) 2017; 65 L You (10180_CR3) 2020; 68 X Chen (10180_CR10) 2015; 14 M Dehghani (10180_CR25) 2020; 13 10180_CR24 T Yang (10180_CR29) 2018; 14 Z Liu (10180_CR4) 2016; 66 TY Liu (10180_CR9) 2015; 53 DB Rawat (10180_CR11) 2017; 4 |
| References_xml | – volume: 30 issue: 10 year: 2017 ident: CR5 article-title: Attack modeling and intrusion detection system for 5G wireless communication network publication-title: International Journal of Communication Systems doi: 10.1002/dac.3237 – volume: 14 start-page: 5135 issue: 9 year: 2015 end-page: 5146 ident: CR10 article-title: Large-scale MIMO relaying techniques for physical layer security: AF or DF? publication-title: IEEE Transactions on Wireless Communications doi: 10.1109/TWC.2015.2433291 – ident: CR14 – volume: 13 start-page: 1 year: 2021 end-page: 12 ident: CR18 article-title: Chaotic deep neural network based physical layer key generation for massive MIMO publication-title: International Journal of Information Technology – volume: 39 year: 2020 ident: CR21 article-title: NOMA and massive MIMO assisted physical layer security using artificial noise pre-coding publication-title: Physical Communication doi: 10.1016/j.phycom.2019.100977 – volume: 4 start-page: 1987 issue: 6 year: 2017 end-page: 1993 ident: CR11 article-title: Evaluating secrecy outage of physical layer security in large-scale MIMO wireless communications for cyber-physical systems publication-title: IEEE Internet of Things Journal doi: 10.1109/JIOT.2017.2691352 – volume: 69 start-page: 13045 issue: 11 year: 2020 end-page: 13059 ident: CR22 article-title: DCE-based secure transmission for massive MIMO relay system against active eavesdropper publication-title: IEEE Transactions on Vehicular Technology doi: 10.1109/TVT.2020.3020086 – volume: 20 start-page: 2753 issue: 10 year: 2020 ident: CR1 article-title: Massive MIMO systems for 5G and beyond networks—Overview, recent trends, challenges, and future research direction publication-title: Sensors doi: 10.3390/s20102753 – volume: 19 start-page: 349 issue: 7 year: 2017 ident: CR12 article-title: Artificial noise-aided physical layer security in underlay cognitive massive MIMO systems with pilot contamination publication-title: Entropy doi: 10.3390/e19070349 – ident: CR8 – volume: 53 start-page: 19 issue: 12 year: 2015 end-page: 25 ident: CR9 article-title: To avoid or not to avoid CSI leakage in physical layer secret communication systems publication-title: IEEE Communications Magazine doi: 10.1109/MCOM.2015.7355561 – volume: 10 start-page: 932 issue: 5 year: 2015 end-page: 940 ident: CR26 article-title: An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2015.2392564 – volume: 476 start-page: 20200162 issue: 2242 year: 2020 ident: CR27 article-title: Optical wireless communications for cyber-secure ubiquitous wireless networks publication-title: Proceedings of the Royal Society A doi: 10.1098/rspa.2020.0162 – volume: 66 start-page: 4453 issue: 5 year: 2016 end-page: 4457 ident: CR4 article-title: Energy and spectral efficiency tradeoff for massive MIMO systems with transmit antenna selection publication-title: IEEE Transactions on Vehicular Technology – volume: 64 start-page: 5189 issue: 12 year: 2016 end-page: 5202 ident: CR15 article-title: Physical layer security with threshold-based multi-user scheduling in multi-antenna wireless networks publication-title: IEEE Transactions on Communications doi: 10.1109/TCOMM.2016.2606396 – volume: 8 start-page: 92 issue: 2 year: 2018 end-page: 99 ident: CR6 article-title: Security architecture of 5g wireless communication network publication-title: International Journal of Sensors Wireless Communications and Control doi: 10.2174/2210327908666180514105607 – ident: CR19 – volume: 14 start-page: 1610 issue: 6 year: 2018 end-page: 1623 ident: CR29 article-title: Secure massive MIMO under imperfect CSI: Performance analysis and channel prediction publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2018.2883150 – volume: 112 start-page: 1537 issue: 3 year: 2020 end-page: 1547 ident: CR20 article-title: Physical layer security for wireless powered massive MIMO decode and forward relay systems with hardware impairments: performance analysis publication-title: Wireless Personal Communications doi: 10.1007/s11277-020-07114-7 – volume: 68 start-page: 2645 year: 2020 end-page: 2659 ident: CR3 article-title: Spectral efficiency and energy efficiency tradeoff in massive MIMO downlink transmission with statistical CSIT publication-title: IEEE Transactions on Signal Processing doi: 10.1109/TSP.2020.2986391 – ident: CR13 – volume: 65 start-page: 4720 issue: 11 year: 2017 end-page: 4733 ident: CR2 article-title: On the energy and spectral efficiency tradeoff in massive MIMO-enabled HetNets with capacity-constrained backhaul links publication-title: IEEE Transactions on Communications doi: 10.1109/TCOMM.2017.2730867 – volume: 14 start-page: 95 issue: 1 year: 2020 end-page: 104 ident: CR17 article-title: Physical layer security in cooperative amplify-and-forward relay networks over mixed Nakagami-m and double Nakagami-m fading channels: Performance evaluation and optimization publication-title: IET Communications doi: 10.1049/iet-com.2019.0584 – ident: CR7 – volume: 15 start-page: 633 issue: 8 year: 2020 end-page: 638 ident: CR16 article-title: Cooperative relay transmission under physical layer security for non-orthogonal networks publication-title: The Journal of Communication doi: 10.12720/jcm.15.8.633-638 – volume: 15 start-page: 3760 year: 2020 end-page: 3774 ident: CR23 article-title: Spatial sparsity based secure transmission strategy for massive MIMO systems against simultaneous jamming and eavesdropping publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2020.3002386 – ident: CR24 – volume: 13 start-page: 10 year: 2020 ident: CR25 article-title: HOGO: Hide objects game optimization publication-title: International Journal of Intelligent Systems – volume: 15 start-page: 3336 year: 2020 end-page: 3347 ident: CR28 article-title: Space–time line code for enhancing physical layer security of multi-user MIMO uplink transmission publication-title: IEEE Systems Journal doi: 10.1109/JSYST.2020.3001068 – volume: 53 start-page: 19 issue: 12 year: 2015 ident: 10180_CR9 publication-title: IEEE Communications Magazine doi: 10.1109/MCOM.2015.7355561 – volume: 30 issue: 10 year: 2017 ident: 10180_CR5 publication-title: International Journal of Communication Systems doi: 10.1002/dac.3237 – ident: 10180_CR19 doi: 10.1109/TVT.2022.3141055 – volume: 14 start-page: 5135 issue: 9 year: 2015 ident: 10180_CR10 publication-title: IEEE Transactions on Wireless Communications doi: 10.1109/TWC.2015.2433291 – ident: 10180_CR14 doi: 10.1109/EIIS.2017.8298625 – volume: 14 start-page: 95 issue: 1 year: 2020 ident: 10180_CR17 publication-title: IET Communications doi: 10.1049/iet-com.2019.0584 – volume: 14 start-page: 1610 issue: 6 year: 2018 ident: 10180_CR29 publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2018.2883150 – ident: 10180_CR8 doi: 10.1109/IWCMC.2019.8766490 – volume: 15 start-page: 3760 year: 2020 ident: 10180_CR23 publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2020.3002386 – volume: 15 start-page: 633 issue: 8 year: 2020 ident: 10180_CR16 publication-title: The Journal of Communication doi: 10.12720/jcm.15.8.633-638 – ident: 10180_CR13 doi: 10.1109/SPAWC.2016.7536826 – volume: 39 year: 2020 ident: 10180_CR21 publication-title: Physical Communication doi: 10.1016/j.phycom.2019.100977 – volume: 112 start-page: 1537 issue: 3 year: 2020 ident: 10180_CR20 publication-title: Wireless Personal Communications doi: 10.1007/s11277-020-07114-7 – ident: 10180_CR7 doi: 10.1109/PIMRC.2014.7136233 – ident: 10180_CR24 doi: 10.1109/ACSSC.2017.8335124 – volume: 8 start-page: 92 issue: 2 year: 2018 ident: 10180_CR6 publication-title: International Journal of Sensors Wireless Communications and Control doi: 10.2174/2210327908666180514105607 – volume: 13 start-page: 1 year: 2021 ident: 10180_CR18 publication-title: International Journal of Information Technology – volume: 13 start-page: 10 year: 2020 ident: 10180_CR25 publication-title: International Journal of Intelligent Systems doi: 10.22266/ijies2020.1031.02 – volume: 68 start-page: 2645 year: 2020 ident: 10180_CR3 publication-title: IEEE Transactions on Signal Processing doi: 10.1109/TSP.2020.2986391 – volume: 66 start-page: 4453 issue: 5 year: 2016 ident: 10180_CR4 publication-title: IEEE Transactions on Vehicular Technology – volume: 10 start-page: 932 issue: 5 year: 2015 ident: 10180_CR26 publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2015.2392564 – volume: 4 start-page: 1987 issue: 6 year: 2017 ident: 10180_CR11 publication-title: IEEE Internet of Things Journal doi: 10.1109/JIOT.2017.2691352 – volume: 19 start-page: 349 issue: 7 year: 2017 ident: 10180_CR12 publication-title: Entropy doi: 10.3390/e19070349 – volume: 69 start-page: 13045 issue: 11 year: 2020 ident: 10180_CR22 publication-title: IEEE Transactions on Vehicular Technology doi: 10.1109/TVT.2020.3020086 – volume: 476 start-page: 20200162 issue: 2242 year: 2020 ident: 10180_CR27 publication-title: Proceedings of the Royal Society A doi: 10.1098/rspa.2020.0162 – volume: 20 start-page: 2753 issue: 10 year: 2020 ident: 10180_CR1 publication-title: Sensors doi: 10.3390/s20102753 – volume: 64 start-page: 5189 issue: 12 year: 2016 ident: 10180_CR15 publication-title: IEEE Transactions on Communications doi: 10.1109/TCOMM.2016.2606396 – volume: 65 start-page: 4720 issue: 11 year: 2017 ident: 10180_CR2 publication-title: IEEE Transactions on Communications doi: 10.1109/TCOMM.2017.2730867 – volume: 15 start-page: 3336 year: 2020 ident: 10180_CR28 publication-title: IEEE Systems Journal doi: 10.1109/JSYST.2020.3001068 |
| SSID | ssj0010092 |
| Score | 2.339943 |
| Snippet | Physical layer security (PLS) is becoming an interesting subject since it guarantees to deliver the most consistent and secure communication in wireless... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1143 |
| SubjectTerms | Bit error rate Communications Engineering Computer Communication Networks Eavesdropping Effectiveness Energy consumption Engineering MIMO communication Networks Neural networks Optimization Pilots Secrecy aspects Security Signal,Image and Speech Processing Strategy Systems design Unmanned aerial vehicles Wireless communications |
| SummonAdditionalLinks | – databaseName: Advanced Technologies & Aerospace Database dbid: P5Z link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEA6-DnrwLb6Zg3jRYp-2OYmPFQVXF1QQL6V5FBe0XbdV2F_i33Umm91VQS8e2yahkC8zXzKZbxjbkZknteDayXWMGxSVhbjmOHdCZAN-zDWPeWaKTcTX18nDA2_ZA7fKXqsc2ERjqFUp6Yz8IEDfnEQxj5KjzqtDVaMoumpLaIyzSc9Hro94bkWPwygCCQoZrT264oE22ibN9FPnPApeosdyjIaV4393TCO2-SNAavzO-dx__3iezVrGCcd9iCywMV0sspkvOoSLbMM2alcvsAvfckaqJfbRKJ4IG3SOCGUOratboBJqz_TQRPKNBhOal80bED040xSVwFGhkb3rSnXLDhzXNWXyQ1YoGB5iADJPuCXSKntwii5b4n6ARjTvjb40nKCLVVAWcIOG7cVmjIIV1O0ts_vzxt3phWPrOTgSF3rt5LHkGpEbZlIcciNFJzw3V2EYqSTRoUAKLSIpkiRQ2pV-roUb5oGKuQiUinWwwiaKstCrDHDfHkqpEVaZxg0mRxbrciVcfOUrT_lrzBtMZiqt2DnV3HhORzLNBIAUAZAaAKTYZ2_Yp9OX-viz9eZg1lO77Kt0NOVrbH-Am9Hn30db_3u0DTZNZe77d9822UTdfdNbbEq-1-2qu21A_wlITQkr priority: 102 providerName: ProQuest |
| Title | Enhancement of PLS Model of Massive MIMO by Detecting Eavesdrop Attacks and Improving the Secrecy Capacity of the System Based on Optimization Strategy |
| URI | https://link.springer.com/article/10.1007/s11277-023-10180-2 https://www.proquest.com/docview/3256857958 |
| Volume | 129 |
| WOSCitedRecordID | wos000939538500003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1572-834X dateEnd: 20241214 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: P5Z dateStart: 20230101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1572-834X dateEnd: 20241214 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: K7- dateStart: 20230101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Engineering Database customDbUrl: eissn: 1572-834X dateEnd: 20241214 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: M7S dateStart: 20230101 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1572-834X dateEnd: 20241214 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: BENPR dateStart: 20230101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: Springer Journals New Starts & Take-Overs Collection customDbUrl: eissn: 1572-834X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0010092 issn: 0929-6212 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fT9swED4x2MN42IBtggHVPUy8bJGSJsHxI7CiIdZS0W1Ce4niH9GQIEVNQOpfsn93d67TwjQmjZdIcWwrks93n3133wG810WkrZI2KK2gA4opEtpzUgYJoYGukFYKWbhiE2IwyC4u5NAnhdVttHvrknSaepHsFrG7kWxM4FinAlK8K0xewnULzkff574DphFyDHsc2EGa2afK_H2Oh-ZogTH_cIs6a3P86mn_uQYvPbrEg5k4rMOSrTZg9R7n4AZs-06X9TXu4YP8kPo1_OpVP1kO-M4QxyUOv4yQy6Vd8UufgDYpR-yf9M9QTfGTZQ8EzYq94s7WZjK-wYOm4ax9LCqD8wsLJJSJIwaoeopHZJ41YX-e0bU7Lmk8JHNqcFzhGSmxa58dip48d_oGvh33vh59DnzthkDTpm6CUmhpSUqTQqt96WjnVBSWJklSk2U2UQSXVapVlsXGhrpbWhUmZWyEVLExwsZvYbkaV3YTkM7oidaWRKiwdJiUhFhDaVRITV0Tme4WRO0S5toTm3N9jat8QcnMS5LTkuRuSXIa82E-5mZG6_HP3jutZOR-i9d5TGAxS4VMsy342ErC4vPjs737v-7b8IJL3M_i3nZguZnc2l14ru-ay3rSgZXD3mB43oFnpyLocOTqiJ7D9EfHbYrf2ncDIQ |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VggQceBQQpQXmAFzAwk-8e0CotKkaNUkjtUgVF-N9WFRq7RCbovwS_gW_kZmNnVAkeuuBo19zWH_z2tn5BuCFzgNtlbReYVNKUEwek85J6cUUDYSptDKVuRs2kY5G4vhYjlfgV9cLw8cqO5voDLWpNO-Rv43IN4sklYn4MPnm8dQorq52IzTmsNi3sx-UstXv-zv0f1-G4W7vaHvPa6cKeJrg1nhFqqWl9Ytzrd5JR4imAr8wcZwYIWysKJBTiVZCRMb6Oiys8uMiMqlUkTGpjUjuNbhOYYRkQzBOPi-qFkxg5Lj9-EgJ-YS2SWfeqhdwsZQ8pOc4s7zwoiNcRrd_FWSdn9u9-7-t0D2400bUuDVXgfuwYss1uP0Hz-IabLQvndRn-Aov9MTUD-Bnr_zK2Od9UqwKHA8OkUfEnfLFkJILcgg47A8PUM1wx3LVhaRiLz-3tZlWE9xqGmYqwLw0uNikQYqs8ZCDcj3DbQpJNOU7LNHdd_zZ-JFCCINViQdkuM_ajlhsCYNnD-HTlazbI1gtq9I-BhRCxFpbUpvcUgItKUr3pVE-3QpNYMJ1CDrwZLolc-eZIqfZkoaaAZcR4DIHuIy-eb34ZjKnMrn07c0OZVlr1upsCbF1eNPhdPn439KeXC7tOdzcOxoOskF_tL8Bt0JWE3fObxNWm-l3-xRu6PPmpJ4-cwqH8OWq8fsbNQxp8g |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1ZS8NAEF5ERfTBW7ydB_FFgzm2Jvvo0aJoa6EqvoXsERQ0LU0U-kv8u85s01ZFBfExm90lMNc3mZ1vGdtViaeMFMZJTYgJik442pwQDkc04IfCiFAk9rKJsNGI7u9F80MXvz3tPihJ9nsaiKUpKw47Oj0cNb55VHrEeONYBioHnfAEJzY0ytdbd8M6AlEKWbY9OuSBXrpsm_l-j8-haYQ3v5RIbeSpzf3_m-fZbIk64bivJgtszGSLbOYDF-Ei2ygnPebPsAef-kbyJfZWzR5IP-hfIrRTaF61gK5Re6KHOgJwdJpQv6hfg-zBmaHKBO4K1eTV5Lrb7sBxUVA3PySZhuGPDED0CS0CrqoHpxi2FeYEtKMdtxzTcIJhVkM7g2t0bs9l1yiUpLq9ZXZbq96cnjvlnQ6OQmMvnDRUwqD28kTJI2Hp6KTnpprzio4iwyXCaFlRMooCbVzlp0a6PA10KGSgdWiCFTaetTOzygBzd66UQdVKDCaZApGsK7R0ccjXnvbXmDcQZ6xKwnO6d-MpHlE1k0hiFElsRRLjmv3hmk6f7uPX2ZsDLYlL08_jAEFkVAlFJVpjBwOtGL3-ebf1v03fYVPNs1p8ddG43GDTPumVPRq3ycaL7ovZYpPqtXjMu9vWIt4Bfi4Khw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enhancement+of+PLS+Model+of+Massive+MIMO+by+Detecting+Eavesdrop+Attacks+and+Improving+the+Secrecy+Capacity+of+the+System+Based+on+Optimization+Strategy&rft.jtitle=Wireless+personal+communications&rft.au=Soni%2C+Chanchal&rft.au=Gupta%2C+Namit&rft.date=2023-03-01&rft.pub=Springer+US&rft.issn=0929-6212&rft.eissn=1572-834X&rft.volume=129&rft.issue=2&rft.spage=1143&rft.epage=1159&rft_id=info:doi/10.1007%2Fs11277-023-10180-2&rft.externalDocID=10_1007_s11277_023_10180_2 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0929-6212&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0929-6212&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0929-6212&client=summon |