Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








14 Hits in 4.1 sec

On SDoF of Multi-Receiver Wiretap Channel With Alternating CSIT [article]

Zohaib Hassan Awan, Abdellatif Zaidi, Aydin Sezgin
2016 arXiv   pre-print
We show that, the synergistic gains in terms of SDoF by alternating CSIT is not restricted to multi-receiver wiretap channels; and, can also be harnessed under broadcast setting.  ...  We study the problem of secure transmission over a Gaussian multi-input single-output (MISO) two receiver channel with an external eavesdropper, under the assumption that the state of the channel which  ...  SDoF of Multi-receiver Wiretap channel with fixed CSIT In this section, we consider the multi-receiver wiretap channel shown in Figure 1 with fixed hybrid CSIT states and establish bounds on SDoF region  ... 
arXiv:1503.06333v3 fatcat:bssfa3u5tzh3pbldgl7ga2uyqu

Achievable secure degrees of freedom of MISO broadcast channel With alternating CSIT

Zohaib Hassan Awan, Abdellatif Zaidi, Aydin Sezgin
2014 2014 IEEE International Symposium on Information Theory  
We study the problem of secure transmission over a twouser Gaussian multi-input single-output (MISO) broadcast channel under the assumption that the channel to each receiver is conveyed either perfectly  ...  Under these assumptions, we first consider the Gaussian MISO wiretap channel and characterize the secure degrees of freedom (SDoF).  ...  SDoF of MISO wiretap channel with alternating CSIT The following theorem characterizes the SDoF of the MISO wiretap channel with alternating CSIT.  ... 
doi:10.1109/isit.2014.6874789 dblp:conf/isit/AwanZS14 fatcat:i436js3pgngvvbavw4hmi4usyq

An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

Amal Hyadi, Zouheir Rezki, Mohamed-Slim Alouini
2016 IEEE Access  
In this paper, we present a comprehensive review of recent and ongoing research works on physical layer security with CSIT uncertainty.  ...  We focus on both information theoretic and signal processing approaches to the topic when the uncertainty concerns the channel to the wiretapper or the channel to the legitimate receiver.  ...  In [121] , the SDoF of a two-user MIMO broadcast wiretap channel with outdated CSI is characterized.  ... 
doi:10.1109/access.2016.2612585 fatcat:lhpjsjnkl5gg7oqjticfmww3x4

Secure Degrees of Freedom of MIMO X-Channels With Output Feedback and Delayed CSIT

Abdellatif Zaidi, Zohaib Hassan Awan, Shlomo Shamai, Luc Vandendorpe
2013 IEEE Transactions on Information Forensics and Security  
We investigate the problem of secure transmission over a two-user multi-input multi-output (MIMO) X-channel in which channel state information is provided with one-unit delay to both transmitters (CSIT  ...  We show that, in presence of asymmetric output feedback and delayed CSIT, the sum SDoF region of the MIMO X-channel is same as the SDoF region of a two-user MIMO BC with 2M-antennas at the transmitter,  ...  ACKNOWLEDGMENT The authors would like to thank BELSPO for the support of the IAP BESTCOM network. Dr  ... 
doi:10.1109/tifs.2013.2278936 fatcat:xcsnqnlywzdn7m7vity7ojqnba

Interplay Between Delayed CSIT and Network Topology for Secure MISO BC [article]

Zohaib Hassan Awan, Aydin Sezgin
2015 arXiv   pre-print
The encoding scheme sheds light on the usage of both resources, i.e., topology of the model and strictly causal channel state information at the transmitter (CSIT); and, allows digitization and multi-casting  ...  Under these assumptions, we first consider the MISO wiretap channel and establish bounds on generalized secure degrees of freedom (GSDoF).  ...  Upper Bound We now establish an upper bound on the GSDoF of the MISO wiretap channel with delayed CSIT and alternating topology.  ... 
arXiv:1510.07930v1 fatcat:5bsjnw2rongslfnaiu2obn55gy

Topological Interference Management with Confidential Messages [article]

Jean de Dieu Mutangana, Ravi Tandon
2023 arXiv   pre-print
The topological interference management (TIM) problem refers to the study of the K-user partially connected interference networks with no channel state information at the transmitters (CSIT), except for  ...  We also present outer bounds on symmetric SDoF for any arbitrary network topology. Using these bounds, we characterize the optimal symmetric SDoF of all K=2-user and K=3-user network topologies.  ...  It was introduced by Wyner in his seminal work on the degraded wiretap channel [55] .  ... 
arXiv:2010.14503v2 fatcat:7satewis7fg7hatmq2fpo6hwz4

Full-Duplex Relay with Delayed CSI Elevates the SDoF of the MIMO X Channel

Tong Zhang, Gaojie Chen, Shuai Wang, Rui Wang
2021 Entropy  
The sum-SDoF upper bound is proposed by means of the existing SDoF region of two-user MIMO broadcast channel with confidential messages (BCCM) and delayed channel state information at the transmitter (  ...  jamming and two-receiver interference alignment scheme, each corresponding to one case of antenna configurations.  ...  with more than two receivers; (4) the impact of imperfect self-interference cancellation on sum-SDoF characterization; and (5) the analysis of error performance of proposed schemes for finite SNR.  ... 
doi:10.3390/e23111484 pmid:34828182 pmcid:PMC8621486 fatcat:i6lwpz6m75cq7jx4a7dcost3yq

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security.  ...  The foundations of single and multi-antenna wiretap channels are treated with some emphasis on the mathematical aspects, in order to facilitate the understanding of advanced multi-user networks.  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security.  ...  The foundations of single and multi-antenna wiretap channels are treated with some emphasis on the mathematical aspects, in order to facilitate the understanding of advanced multi-user networks.  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

Secure Retrospective Interference Alignment [article]

Mohamed Seif, Ravi Tandon, Ming Li
2018 arXiv   pre-print
To the best of our knowledge, this is the first result on the K-user interference channel with secrecy constrained models and delayed CSIT that achieves a SDoF which scales with K, the number of users.  ...  In this paper, the K-user interference channel with secrecy constraints is considered with delayed channel state information at transmitters (CSIT).  ...  Also, there are various other works for different CSIT assumptions such as MIMO wiretap channel with no eavesdropper CSIT [21] , broadcast channel with alternating CSIT [22] .  ... 
arXiv:1801.03494v3 fatcat:tx6bzc4jxnfkdcf5jw3k5vjotq

A Survey on Robust Interference Management in Wireless Networks

Jaber Kakar, Aydin Sezgin
2017 Entropy  
The survey concludes with a discussion of open problems.  ...  However, the main issue behind most of these results is the assumption of perfect channel state information at the transmitters (CSIT).  ...  To the best of our knowledge, so far existing work for the imperfect CSIT focus on the SDoF of the MISO BC with an external eavesdropper under alternating CSIT [10, 68, 102] and on the (MIMO) wiretap  ... 
doi:10.3390/e19070362 fatcat:dthoc7lilncubcx4d7twsu4ucu

Technical Program

2021 2020 IEEE Information Theory Workshop (ITW)  
multiple-access wiretap channel with degraded message sets (GMAC-WT-DMS) equals the capacity of the same model without secrecy constraint.  ...  channel with feedback equals the capacity of the same model without secrecy constraint.  ...  Channel with Confidential Messages (BCCM) and alternating Channel State Information at the Transmitter (CSIT) is investigated.  ... 
doi:10.1109/itw46852.2021.9457668 fatcat:j425ygeajrbd5esztbe5zgygty

Wireless Physical Layer Security with CSIT Uncertainty EXAMINATION COMMITTEE PAGE

Amal Hyadi, Amal Hyadi
2017 unpublished
We also discuss the broadcast channel with confidential messages (BCCM) where the transmitter has one common message to be transmitted to two users and one secret message intended to only one of them.  ...  We investigate both the single-user multiple-input multiple-output (MIMO) wiretap channel and the multiuser broadcast wiretap channel.  ...  the block fading multi-user broadcast wiretap channel with perfect main CSIT is given by eavesdropper with the strongest wiretapping channel.  ... 
fatcat:lqg4wuqdybgm5oznhzubdgctxy

On deterministic models for capacity approximations in interference networks and information theoretic security [article]

Rick Fritschek, Technische Universität Berlin, Technische Universität Berlin, Gerhard Wunder
2018
This channel model is an example of a multi-user interference-affected network.  ...  This work considers two major challenges of modern wireless communication. The first challenge is the analysis and management of interference in multi-user wireless channels.  ...  In [XU12] and [XU13] , the real IA approach was used on the wiretap channel with a helper (with and without CSIT, respectively) to investigate the s.d.o.f, therefore achieve results for the infinite  ... 
doi:10.14279/depositonce-7149 fatcat:jp6aexq2lrbwrbwfms7uhfafnu