A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Wireless physical layer security
2016
Proceedings of the National Academy of Sciences of the United States of America
For data confidentiality, encryption is the primary method of ensuring secrecy, a method that works well in most current situations. ...
Alice and Bob share a common secret key K that is unknown to Eve. To establish the secrecy of the message, Alice uses this key to encrypt the message M into a codeword X , which is then transmitted. ...
This work was supported in part by the US National Science Foundation under Grants CMMI-1435778 and ECCS-1647198 and in part by the German Research Foundation under Grant WY 151/2-1. ...
doi:10.1073/pnas.1618130114
pmid:28028211
pmcid:PMC5224364
fatcat:arb5vh24l5cjvpfgaeg3uedysy
A Survey of Optimization Approaches for Wireless Physical Layer Security
[article]
2019
arXiv
pre-print
The survey begins with typical wiretap channel models to cover common scenarios and systems. ...
Furthermore, the impacts of channel state information on optimization and design are discussed. Finally, the survey concludes with the observations on potential future directions and open challenges. ...
Some special cases of multiple-access channel in physical layer security are also investigated, such as SISO multiple-access channel with an eavesdropper [25] and multiple-access channel with common ...
arXiv:1901.07955v1
fatcat:3pb27rlc45c3dmnjgwmjyspvb4
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference ...
Other recent work on secure multi-user communications investigate the multiple-access channel (MAC) with confidential messages [108] , [109] , the MAC wiretap channel (MAC-WT) [110] , [111] , and the ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference ...
Other recent work on secure multi-user communications investigate the multiple-access channel (MAC) with confidential messages [108] , [109] , the MAC wiretap channel (MAC-WT) [110] , [111] , and the ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
Privacy in Bidirectional Relay Networks
2012
IEEE Transactions on Communications
In this work, the bidirectional broadcast channel (BBC) with confidential messages is studied. ...
The capacity-equivocation and secrecy capacity regions of the BBC with confidential messages are established where the latter characterizes the communication scenario with perfect secrecy, which means ...
., secrecy in multiple access channels is analyzed in [7, 8] , while [9] discusses the interference channel with confidential messages and [10, 11] the MIMO Gaussian broadcast channel with common ...
doi:10.1109/tcomm.2012.041212.100584
fatcat:47brqgjl7rexrjtmddmhqpqlwy
Resource Allocation for Secure Wireless Powered Integrated Multicast and Unicast Services With Full Duplex Self-Energy Recycling
2019
IEEE Transactions on Wireless Communications
In addition, we extend the SMRRM problem to the imperfect channel state information case where a worst-case SMRRM formulation is investigated. ...
all users, and a confidential unicast service subscribed to by only one user while protecting it from any other unsubscribed users and an eavesdropper. ...
Fig. 7 shows the worstcase secrecy-multicast performance tradeoff versus antenna configurations with the perfect and imperfect CSI cases. ...
doi:10.1109/twc.2018.2883563
fatcat:pivgkkbfmvevxakjrtfqwfskfe
Power Allocation in Multiuser Parallel Gaussian Broadcast Channels With Common and Confidential Messages
2016
IEEE Transactions on Communications
In [31] , the beamforming and user selection problems were studied in multicast multiple-input single-output (MISO) channel, where the transmitter broadcasts a common confidential message to legitimate ...
An important scenario for multiuser physical layer security is the broadcast channel with confidential messages (BCC) introduced in [14]. ...
The multicast channel with multiple eavesdroppers can be seen as a compound wiretap channel [19] , [20] , in which the transmitter sends common message to all receivers and keeps the message secret from ...
doi:10.1109/tcomm.2016.2552166
fatcat:asrdommktfdybaj3qs6337c6py
Exploiting Array Pattern Synthesis for Physical Layer Security in Millimeter Wave Channels
2019
Electronics
In this paper, we propose a beamformer design scheme for wireless physical layer security using partial channel state information (CSI) in millimeter wave channels. ...
Numerical results are presented to verify the secrecy rates achieved by the proposed scheme. ...
While the compound wiretap channel assumes the perfect knowledge on the destination's channel, we consider only the AOD range for the destination. ...
doi:10.3390/electronics8070745
fatcat:yqw3qawqhrbsfexuerau754pw4
Almost universal codes for MIMO wiretap channels
2018
IEEE Transactions on Information Theory
algebras centered at such number fields in the multiple-antenna case. ...
Finally, we consider a compound wiretap model with a more restricted uncertainty set, and show that rates R <C b −Ce − κ are achievable, whereC b is a lower bound for Bob's capacity andCe is an upper bound ...
ACKNOWLEDGEMENTS We are grateful to Matthieu Bloch for useful discussions about the secrecy capacity of arbitrary wiretap channels. ...
doi:10.1109/tit.2018.2857487
fatcat:yfk76ds6grhl7gbs2fptquftg4
Secrecy Degrees of Freedom of MIMO Broadcast Channels with Delayed CSIT
[article]
2011
arXiv
pre-print
The degrees of freedom (DoF) of the two-user Gaussian multiple-input and multiple-output (MIMO) broadcast channel with confidential message (BCC) is studied under the assumption that delayed channel state ...
The proposed scheme sends the confidential messages superposed with the artificial noise over several time slots. ...
INTRODUCTION We consider the two-user Gaussian multi-input multi-output broadcast channel with confidential messages (MIMO-BCC), where the transmitter sends two confidential messages to receivers A and ...
arXiv:1112.2306v1
fatcat:glxuhbcstrerbbnk2xe663cfue
Physical-Layer Security in 6G Networks
2021
IEEE Open Journal of the Communications Society
This paper discusses challenges, solutions and visions of PLS in beyond-5G networks. ...
In this scenario, physical-layer security (PLS) can act as a first line of defense, providing security even to low-resourced nodes in different environments. ...
In [54] , the authors investigated an IRS-aided secure wireless communication system where a multi-antenna access point (AP) sends confidential message in the presence of an eavesdropper. ...
doi:10.1109/ojcoms.2021.3103735
fatcat:kcntnplyqnc45bp5i5wceiwk4m
Cognitive Radio Networks: An Information Theoretic Perspective
[article]
2020
arXiv
pre-print
In particular, we emphasize the interaction of cognitive radio with emerging technologies for 5G networks. ...
that should be considered in wireless network design paradigms based on this technology. ...
The DM-CIC with two confidential messages is studied in [31] , in which both primary and cognitive messages must be secure at unintended receivers. ...
arXiv:2001.09261v1
fatcat:bfoyep6ja5gehgt5ndvndn4nxi
Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges
[article]
2022
arXiv
pre-print
the identified branches, focusing on dedicated security issues, including, e.g., physical-layer confidentiality, anti-jamming schemes, anti-spoofing strategies, and quantum-based key distribution schemes ...
On the other hand, cybersecurity techniques and solutions applied in SATCOM links should be updated to reflect the substantial advancements in attacker capabilities characterizing the last two decades. ...
The vast majority of the works assume the perfect knowledge of the channel quality at the eavesdropper side. ...
arXiv:2112.11324v4
fatcat:em7bfwxg7bdvzcjkyc5aydiena
Enhancing PHY Security of Cooperative Cognitive Radio Multicast Communications
[article]
2017
arXiv
pre-print
In the case of active eavesdroppers and perfect channel state information (CSI) at the transceivers, the utility function of interest is nonconcave and the involved constraints are nonconvex, and thus, ...
Then, we extend the optimization approach to the case of passive eavesdroppers and imperfect CSI knowledge at the transceivers, where the constraints are transformed into a linear matrix inequality and ...
The channel of each legitimate user together with the respective Eves form a compound wiretap channel [35] . ...
arXiv:1707.02380v1
fatcat:mgkqsjio6zejvnuufbmm57pt5m
Almost universal codes for MIMO wiretap channels
[article]
2018
arXiv
pre-print
algebras centered at such number fields in the multiple-antenna case. ...
Finally, we consider a compound wiretap model with a more restricted uncertainty set, and show that rates R<C̅_b-C̅_e-κ are achievable, where C̅_b is a lower bound for Bob's capacity and C̅_e is an upper ...
ACKNOWLEDGEMENTS We are grateful to Matthieu Bloch for useful discussions about the secrecy capacity of arbitrary wiretap channels, and to Roberto Pinciroli for his suggestions for the proof of Corollary ...
arXiv:1611.01428v3
fatcat:yjs4diphxbee3ffbett5zqigz4
« Previous
Showing results 1 — 15 out of 455 results