|| A. Abdi, W. Lau, M.-S. Alouini, and M. Kaveh, “A new simple model for land mobile|
satellite channels: first- and second-order statistics,” IEEE Transactions on Wireless
Communications, vol. 2, no. 3, pp. 519–528, 2003.
 K. An, M. Lin, J. Ouyang, and W.-P. Zhu, “Secure transmission in cognitive satellite
terrestrial networks,” IEEE Journal on Selected Areas in Communications, vol. 34,
no. 11, pp. 3025–3037, 2016.
 M. n. Vázquez, A. Pérez-Neira, D. Christopoulos, S. Chatzinotas, B. Ottersten, P.-D.
Arapoglou, A. Ginesi, and G. Taricco, “Precoding in multibeam satellite communications:
Present and future challenges,” IEEE Wireless Communications, vol. 23,
no. 6, pp. 88–95, 2016.
 L. You, A. Liu, W. Wang, and X. Gao, “Outage constrained robust multigroup multicast
beamforming for multi-beam satellite communication systems,” IEEE Wireless
Communications Letters, vol. 8, no. 2, pp. 352–355, 2019.
 L. Lu, G. Y. Li, A. L. Swindlehurst, A. Ashikhmin, and R. Zhang, “An overview of
massive mimo: Benefits and challenges,” IEEE Journal of Selected Topics in Signal
Processing, vol. 8, no. 5, pp. 742–758, 2014.
 L. You, X. Gao, X.-G. Xia, N. Ma, and Y. Peng, “Pilot reuse for massive mimo
transmission over spatially correlated rayleigh fading channels,” IEEE Transactions
on Wireless Communications, vol. 14, no. 6, pp. 3352–3366, 2015.
 A.-A. Lu, X. Gao, W. Zhong, C. Xiao, and X. Meng, “Robust transmission for massive
mimo downlink with imperfect csi,” IEEE Transactions on Communications,
vol. 67, no. 8, pp. 5362–5376, 2019.
 R. Miller and W. Trappe, “Subverting MIMO wireless systems by jamming the channel
estimation procedure,” ACM Conference on Wireless Network Security, pp. 19–
 G. Noubir, R. Rajaraman, B. Sheng, and B. Thapa, “On the robustness of IEEE
802.11 rate adaptation algorithms against smart jamming,” ACM Conference on
Wireless Network Security, pp. 97––108, 2011.
 Y. Yang, Y. Chen, W. Wang, and G. Yang, “Securing channel state information in
multiuser MIMO with limited feedback,” IEEE Transactions on Wireless Communications,
vol. 19, no. 5, pp. 3091–3103, 2020.
 B. Li, Z. Fei, C. Zhou, and Y. Zhang, “Physical-layer security in space information
networks: A survey,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 33–52, 2020.
 M. G. Schraml, R. T. Schwarz, and A. Knopp, “Multiuser MIMO concept for physical
layer security in multibeam satellite systems,” IEEE Transactions on Information
Forensics and Security, vol. 16, pp. 1670–1680, 2021.
 Z. Lin, M. Lin, J.-B. Wang, Y. Huang, and W.-P. Zhu, “Robust secure beamforming
for 5G cellular networks coexisting with satellite networks,” IEEE Journal on
Selected Areas in Communications, vol. 36, no. 4, pp. 932–945, 2018.
 J. Lei, Z. Han, M. n. Vazquez-Castro, and A. Hjorungnes, “Secure satellite communication
systems design with individual secrecy rate constraints,” IEEE Transactions
on Information Forensics and Security, vol. 6, no. 3, pp. 661–671, 2011.
 A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of
physical layer security in multiuser wireless networks: A survey,” IEEE Communications
Surveys Tutorials, vol. 16, no. 3, pp. 1550–1573, 2014.
 Y. Peng, P. Wang, W. Xiang, and Y. Li, “Secret key generation based on estimated
channel state information for TDD-OFDM systems over fading channels,” IEEE
Transactions on Wireless Communications, vol. 16, no. 8, pp. 5176–5186, 2017.
 C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam,
“Information-theoretically secret key generation for fading wireless channels,” IEEE
Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 240–254,
 H. Liu, Y. Wang, J. Yang, and Y. Chen, “Fast and practical secret key extraction by
exploiting channel response,” IEEE INFOCOM, pp. 3048–3056, 2013.
 Z. Jiang, J. Zhao, X.-Y. Li, J. Han, and W. Xi, “Rejecting the attack: Source authentication
for Wi-Fi management frames using CSI information,” IEEE INFOCOM,
pp. 2544–2552, 2013.
 T.-Y. Liu, S.-C. Lin, and Y.-W. P. Hong, “On the role of artificial noise in training and
data transmission for secret communications,” IEEE Transactions on Information
Forensics and Security, vol. 12, no. 3, pp. 516–531, 2017.
 N. Yang, M. Elkashlan, T. Q. Duong, J. Yuan, and R. Malaney, “Optimal transmission
with artificial noise in MISOME wiretap channels,” IEEE Transactions on Vehicular
Technology, vol. 65, no. 4, pp. 2170–2181, 2016.
 Y.-C. Tung, S. Han, D. Chen, and K. G. Shin, “Vulnerability and protection of channel
state information in multiuser MIMO networks,” ACM SIGSAC Conference on
Computer and Communications Security, pp. 775––786, 2014.
 X. Zhang and E. W. Knightly, “CSIsnoop: Inferring channel state information in
multi-user MIMO WLANs,” IEEE/ACM Transactions on Networking, vol. 27, no. 1,
pp. 231–244, 2019.
 C. Zhang, Y. Jing, Y. Huang, and L. Yang, “Performance analysis for massive MIMO
downlink with low complexity approximate zero-forcing precoding,” IEEE Transactions
on Communications, vol. 66, no. 9, pp. 3848–3864, 2018.
 L. U. Khan, N. Khan, M. I. Khattak, and M. Shafi, “LS estimator: Performance analysis
for block-type and comb-type channel estimation in OFDM system,” International
Bhurban Conference on Applied Sciences Technology (IBCAST), pp. 420–424,
 Y. Liu and S. Sezginer, “Iterative compensated MMSE channel estimation in LTE
systems,” IEEE International Conference on Communications (ICC), pp. 4862–
 NR; Physical channels and modulation, 3GPP, Dec. 2020, TS 38.211 V16.4.0.
 Security architecture and procedures for 5G System, 3GPP, Mar. 2021, TS 33.501
 System Tool Kit 11, Analytical Graphics, Inc., 2019. [Online]. Available:
 Digital Video Broadcasting (DVB); Second Generation Framing Structure, Channel
Coding and Modulation Systems for Broadcasting, Interactive Services, News
Gathering and Other Broadband Satellite Applications; Part 1: DVB-S2, ETSI EN
 K. HIGUCHI and A. BENJEBBOUR, “Non-orthogonal multiple access (NOMA)
with successive interference cancellation for future radio access,” IEICE Transactions
on Communications, vol. E98.B, no. 3, pp. 403–414, 2015.