Xiangyun Zhou

Learn More
An emerging solution for prolonging the lifetime of energy constrained relay nodes in wireless networks is to avail the ambient radio-frequency (RF) signal and to simultaneously harvest energy and process information. In this paper, an amplifyand-forward (AF) relaying network is considered, where an energy constrained relay node harvests energy from the(More)
We consider the problem of secure communication with multiantenna transmission in fading channels. The transmitter simultaneously transmits an information-bearing signal to the intended receiver and artificial noise to the eavesdroppers. We obtain an analytical closed-form expression of an achievable secrecy rate and use it as the objective function to(More)
This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of security. We consider random networks where the legitimate nodes and the eavesdroppers are distributed(More)
This letter studies information-theoretic security without knowing the eavesdropper’s channel fading state. We present an alternative secrecy outage formulation to measure the probability that message transmissions fail to achieve perfect secrecy. Using this formulation, we design two transmission schemes that satisfy the given security requirement while(More)
We study physical-layer security in wireless ad hoc networks and investigate two types of multi-antenna transmission schemes for providing secrecy enhancements. To establish secure transmission against malicious eavesdroppers, we consider the generation of artificial noise with either sectoring or beamforming. For both approaches, we provide a statistical(More)
In this paper, we investigate the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels. The primary design concerns include the transmit power allocation and the rate parameters of the wiretap code. We consider two scenarios with different complexity levels: i) the design parameters are chosen to be fixed for all(More)
Information-theoretic security constraints reduce the connectivity of wireless networks in the presence of eavesdroppers, which motivates better modeling of such networks and the development of techniques that are robust to eavesdropping. In this letter, we are concerned with the existence of secure connections from a typical transmitter to the legitimate(More)
In this paper, we consider a decode-and-forward (DF) relaying network based on wireless energy harvesting. The energy constrained relay node first harvests energy through radio-frequency (RF) signals from the source node. Next, the relay node uses the harvested energy to forward the decoded source information to the destination node. The source node(More)
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a twophase communication protocol with fixed-rate transmission. In the first phase, wireless power transfer is conducted from the source to the jammer. In the second(More)
In this paper, we present an analytical model for evaluating the impact of shadowing and beamforming on the connectivity of wireless ad hoc networks accommodating nodes equipped with multiple antennas. We consider two simple beamforming schemes: random beamforming, where each node selects a main beam direction randomly with no coordination with other nodes,(More)