Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








455 Hits in 3.7 sec

Wireless physical layer security

H. Vincent Poor, Rafael F. Schaefer
2016 Proceedings of the National Academy of Sciences of the United States of America  
For data confidentiality, encryption is the primary method of ensuring secrecy, a method that works well in most current situations.  ...  Alice and Bob share a common secret key K that is unknown to Eve. To establish the secrecy of the message, Alice uses this key to encrypt the message M into a codeword X , which is then transmitted.  ...  This work was supported in part by the US National Science Foundation under Grants CMMI-1435778 and ECCS-1647198 and in part by the German Research Foundation under Grant WY 151/2-1.  ... 
doi:10.1073/pnas.1618130114 pmid:28028211 pmcid:PMC5224364 fatcat:arb5vh24l5cjvpfgaeg3uedysy

A Survey of Optimization Approaches for Wireless Physical Layer Security [article]

Dong Wang, Bo Bai, Wenbo Zhao, Zhu Han
2019 arXiv   pre-print
The survey begins with typical wiretap channel models to cover common scenarios and systems.  ...  Furthermore, the impacts of channel state information on optimization and design are discussed. Finally, the survey concludes with the observations on potential future directions and open challenges.  ...  Some special cases of multiple-access channel in physical layer security are also investigated, such as SISO multiple-access channel with an eavesdropper [25] and multiple-access channel with common  ... 
arXiv:1901.07955v1 fatcat:3pb27rlc45c3dmnjgwmjyspvb4

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference  ...  Other recent work on secure multi-user communications investigate the multiple-access channel (MAC) with confidential messages [108] , [109] , the MAC wiretap channel (MAC-WT) [110] , [111] , and the  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference  ...  Other recent work on secure multi-user communications investigate the multiple-access channel (MAC) with confidential messages [108] , [109] , the MAC wiretap channel (MAC-WT) [110] , [111] , and the  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

Privacy in Bidirectional Relay Networks

R. F. Wyrembelski, H. Boche
2012 IEEE Transactions on Communications  
In this work, the bidirectional broadcast channel (BBC) with confidential messages is studied.  ...  The capacity-equivocation and secrecy capacity regions of the BBC with confidential messages are established where the latter characterizes the communication scenario with perfect secrecy, which means  ...  ., secrecy in multiple access channels is analyzed in [7, 8] , while [9] discusses the interference channel with confidential messages and [10, 11] the MIMO Gaussian broadcast channel with common  ... 
doi:10.1109/tcomm.2012.041212.100584 fatcat:47brqgjl7rexrjtmddmhqpqlwy

Resource Allocation for Secure Wireless Powered Integrated Multicast and Unicast Services With Full Duplex Self-Energy Recycling

Zheng Chu, Fuhui Zhou, Pei Xiao, Zhengyu Zhu, De Mi, Naofal Al-Dhahir, Rahim Tafazolli
2019 IEEE Transactions on Wireless Communications  
In addition, we extend the SMRRM problem to the imperfect channel state information case where a worst-case SMRRM formulation is investigated.  ...  all users, and a confidential unicast service subscribed to by only one user while protecting it from any other unsubscribed users and an eavesdropper.  ...  Fig. 7 shows the worstcase secrecy-multicast performance tradeoff versus antenna configurations with the perfect and imperfect CSI cases.  ... 
doi:10.1109/twc.2018.2883563 fatcat:pivgkkbfmvevxakjrtfqwfskfe

Power Allocation in Multiuser Parallel Gaussian Broadcast Channels With Common and Confidential Messages

Ahmed Benfarah, Stefano Tomasin, Nicola Laurenti
2016 IEEE Transactions on Communications  
In [31] , the beamforming and user selection problems were studied in multicast multiple-input single-output (MISO) channel, where the transmitter broadcasts a common confidential message to legitimate  ...  An important scenario for multiuser physical layer security is the broadcast channel with confidential messages (BCC) introduced in [14].  ...  The multicast channel with multiple eavesdroppers can be seen as a compound wiretap channel [19] , [20] , in which the transmitter sends common message to all receivers and keeps the message secret from  ... 
doi:10.1109/tcomm.2016.2552166 fatcat:asrdommktfdybaj3qs6337c6py

Exploiting Array Pattern Synthesis for Physical Layer Security in Millimeter Wave Channels

Jong-Ho Lee, Jeongsik Choi, Woong-Hee Lee, Jiho Song
2019 Electronics  
In this paper, we propose a beamformer design scheme for wireless physical layer security using partial channel state information (CSI) in millimeter wave channels.  ...  Numerical results are presented to verify the secrecy rates achieved by the proposed scheme.  ...  While the compound wiretap channel assumes the perfect knowledge on the destination's channel, we consider only the AOD range for the destination.  ... 
doi:10.3390/electronics8070745 fatcat:yqw3qawqhrbsfexuerau754pw4

Almost universal codes for MIMO wiretap channels

Laura Luzzi, Roope Vehkalahti, Cong Ling
2018 IEEE Transactions on Information Theory  
algebras centered at such number fields in the multiple-antenna case.  ...  Finally, we consider a compound wiretap model with a more restricted uncertainty set, and show that rates R <C b −Ce − κ are achievable, whereC b is a lower bound for Bob's capacity andCe is an upper bound  ...  ACKNOWLEDGEMENTS We are grateful to Matthieu Bloch for useful discussions about the secrecy capacity of arbitrary wiretap channels.  ... 
doi:10.1109/tit.2018.2857487 fatcat:yfk76ds6grhl7gbs2fptquftg4

Secrecy Degrees of Freedom of MIMO Broadcast Channels with Delayed CSIT [article]

Sheng Yang, Mari Kobayashi, Pablo Piantanida, Shlomo Shamai
2011 arXiv   pre-print
The degrees of freedom (DoF) of the two-user Gaussian multiple-input and multiple-output (MIMO) broadcast channel with confidential message (BCC) is studied under the assumption that delayed channel state  ...  The proposed scheme sends the confidential messages superposed with the artificial noise over several time slots.  ...  INTRODUCTION We consider the two-user Gaussian multi-input multi-output broadcast channel with confidential messages (MIMO-BCC), where the transmitter sends two confidential messages to receivers A and  ... 
arXiv:1112.2306v1 fatcat:glxuhbcstrerbbnk2xe663cfue

Physical-Layer Security in 6G Networks

L. Mucchi, S. Jayousi, S. Caputo, E. Panayirci, S. Shahabuddin, J. Bechtold, I. Morales, A. Stoica, G. Abreu, H. Haas
2021 IEEE Open Journal of the Communications Society  
This paper discusses challenges, solutions and visions of PLS in beyond-5G networks.  ...  In this scenario, physical-layer security (PLS) can act as a first line of defense, providing security even to low-resourced nodes in different environments.  ...  In [54] , the authors investigated an IRS-aided secure wireless communication system where a multi-antenna access point (AP) sends confidential message in the presence of an eavesdropper.  ... 
doi:10.1109/ojcoms.2021.3103735 fatcat:kcntnplyqnc45bp5i5wceiwk4m

Cognitive Radio Networks: An Information Theoretic Perspective [article]

Mojtaba Vaezi
2020 arXiv   pre-print
In particular, we emphasize the interaction of cognitive radio with emerging technologies for 5G networks.  ...  that should be considered in wireless network design paradigms based on this technology.  ...  The DM-CIC with two confidential messages is studied in [31] , in which both primary and cognitive messages must be secure at unintended receivers.  ... 
arXiv:2001.09261v1 fatcat:bfoyep6ja5gehgt5ndvndn4nxi

Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges [article]

Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro
2022 arXiv   pre-print
the identified branches, focusing on dedicated security issues, including, e.g., physical-layer confidentiality, anti-jamming schemes, anti-spoofing strategies, and quantum-based key distribution schemes  ...  On the other hand, cybersecurity techniques and solutions applied in SATCOM links should be updated to reflect the substantial advancements in attacker capabilities characterizing the last two decades.  ...  The vast majority of the works assume the perfect knowledge of the channel quality at the eavesdropper side.  ... 
arXiv:2112.11324v4 fatcat:em7bfwxg7bdvzcjkyc5aydiena

Enhancing PHY Security of Cooperative Cognitive Radio Multicast Communications [article]

Van-Dinh Nguyen, Trung Q. Duong, Oh-Soon Shin, Arumugam Nallanathan,, George K. Karagiannidis
2017 arXiv   pre-print
In the case of active eavesdroppers and perfect channel state information (CSI) at the transceivers, the utility function of interest is nonconcave and the involved constraints are nonconvex, and thus,  ...  Then, we extend the optimization approach to the case of passive eavesdroppers and imperfect CSI knowledge at the transceivers, where the constraints are transformed into a linear matrix inequality and  ...  The channel of each legitimate user together with the respective Eves form a compound wiretap channel [35] .  ... 
arXiv:1707.02380v1 fatcat:mgkqsjio6zejvnuufbmm57pt5m

Almost universal codes for MIMO wiretap channels [article]

Laura Luzzi, Roope Vehkalahti, Cong Ling
2018 arXiv   pre-print
algebras centered at such number fields in the multiple-antenna case.  ...  Finally, we consider a compound wiretap model with a more restricted uncertainty set, and show that rates R<C̅_b-C̅_e-κ are achievable, where C̅_b is a lower bound for Bob's capacity and C̅_e is an upper  ...  ACKNOWLEDGEMENTS We are grateful to Matthieu Bloch for useful discussions about the secrecy capacity of arbitrary wiretap channels, and to Roberto Pinciroli for his suggestions for the proof of Corollary  ... 
arXiv:1611.01428v3 fatcat:yjs4diphxbee3ffbett5zqigz4
« Previous Showing results 1 — 15 out of 455 results