A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
On SDoF of Multi-Receiver Wiretap Channel With Alternating CSIT
[article]
2016
arXiv
pre-print
We show that, the synergistic gains in terms of SDoF by alternating CSIT is not restricted to multi-receiver wiretap channels; and, can also be harnessed under broadcast setting. ...
We study the problem of secure transmission over a Gaussian multi-input single-output (MISO) two receiver channel with an external eavesdropper, under the assumption that the state of the channel which ...
SDoF of Multi-receiver Wiretap channel with fixed CSIT In this section, we consider the multi-receiver wiretap channel shown in Figure 1 with fixed hybrid CSIT states and establish bounds on SDoF region ...
arXiv:1503.06333v3
fatcat:bssfa3u5tzh3pbldgl7ga2uyqu
Achievable secure degrees of freedom of MISO broadcast channel With alternating CSIT
2014
2014 IEEE International Symposium on Information Theory
We study the problem of secure transmission over a twouser Gaussian multi-input single-output (MISO) broadcast channel under the assumption that the channel to each receiver is conveyed either perfectly ...
Under these assumptions, we first consider the Gaussian MISO wiretap channel and characterize the secure degrees of freedom (SDoF). ...
SDoF of MISO wiretap channel with alternating CSIT The following theorem characterizes the SDoF of the MISO wiretap channel with alternating CSIT. ...
doi:10.1109/isit.2014.6874789
dblp:conf/isit/AwanZS14
fatcat:i436js3pgngvvbavw4hmi4usyq
An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty
2016
IEEE Access
In this paper, we present a comprehensive review of recent and ongoing research works on physical layer security with CSIT uncertainty. ...
We focus on both information theoretic and signal processing approaches to the topic when the uncertainty concerns the channel to the wiretapper or the channel to the legitimate receiver. ...
In [121] , the SDoF of a two-user MIMO broadcast wiretap channel with outdated CSI is characterized. ...
doi:10.1109/access.2016.2612585
fatcat:lhpjsjnkl5gg7oqjticfmww3x4
Secure Degrees of Freedom of MIMO X-Channels With Output Feedback and Delayed CSIT
2013
IEEE Transactions on Information Forensics and Security
We investigate the problem of secure transmission over a two-user multi-input multi-output (MIMO) X-channel in which channel state information is provided with one-unit delay to both transmitters (CSIT ...
We show that, in presence of asymmetric output feedback and delayed CSIT, the sum SDoF region of the MIMO X-channel is same as the SDoF region of a two-user MIMO BC with 2M-antennas at the transmitter, ...
ACKNOWLEDGMENT The authors would like to thank BELSPO for the support of the IAP BESTCOM network. Dr ...
doi:10.1109/tifs.2013.2278936
fatcat:xcsnqnlywzdn7m7vity7ojqnba
Interplay Between Delayed CSIT and Network Topology for Secure MISO BC
[article]
2015
arXiv
pre-print
The encoding scheme sheds light on the usage of both resources, i.e., topology of the model and strictly causal channel state information at the transmitter (CSIT); and, allows digitization and multi-casting ...
Under these assumptions, we first consider the MISO wiretap channel and establish bounds on generalized secure degrees of freedom (GSDoF). ...
Upper Bound We now establish an upper bound on the GSDoF of the MISO wiretap channel with delayed CSIT and alternating topology. ...
arXiv:1510.07930v1
fatcat:5bsjnw2rongslfnaiu2obn55gy
Topological Interference Management with Confidential Messages
[article]
2023
arXiv
pre-print
The topological interference management (TIM) problem refers to the study of the K-user partially connected interference networks with no channel state information at the transmitters (CSIT), except for ...
We also present outer bounds on symmetric SDoF for any arbitrary network topology. Using these bounds, we characterize the optimal symmetric SDoF of all K=2-user and K=3-user network topologies. ...
It was introduced by Wyner in his seminal work on the degraded wiretap channel [55] . ...
arXiv:2010.14503v2
fatcat:7satewis7fg7hatmq2fpo6hwz4
Full-Duplex Relay with Delayed CSI Elevates the SDoF of the MIMO X Channel
2021
Entropy
The sum-SDoF upper bound is proposed by means of the existing SDoF region of two-user MIMO broadcast channel with confidential messages (BCCM) and delayed channel state information at the transmitter ( ...
jamming and two-receiver interference alignment scheme, each corresponding to one case of antenna configurations. ...
with more than two receivers; (4) the impact of imperfect self-interference cancellation on sum-SDoF characterization; and (5) the analysis of error performance of proposed schemes for finite SNR. ...
doi:10.3390/e23111484
pmid:34828182
pmcid:PMC8621486
fatcat:i6lwpz6m75cq7jx4a7dcost3yq
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. ...
The foundations of single and multi-antenna wiretap channels are treated with some emphasis on the mathematical aspects, in order to facilitate the understanding of advanced multi-user networks. ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. ...
The foundations of single and multi-antenna wiretap channels are treated with some emphasis on the mathematical aspects, in order to facilitate the understanding of advanced multi-user networks. ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
Secure Retrospective Interference Alignment
[article]
2018
arXiv
pre-print
To the best of our knowledge, this is the first result on the K-user interference channel with secrecy constrained models and delayed CSIT that achieves a SDoF which scales with K, the number of users. ...
In this paper, the K-user interference channel with secrecy constraints is considered with delayed channel state information at transmitters (CSIT). ...
Also, there are various other works for different CSIT assumptions such as MIMO wiretap channel with no eavesdropper CSIT [21] , broadcast channel with alternating CSIT [22] . ...
arXiv:1801.03494v3
fatcat:tx6bzc4jxnfkdcf5jw3k5vjotq
A Survey on Robust Interference Management in Wireless Networks
2017
Entropy
The survey concludes with a discussion of open problems. ...
However, the main issue behind most of these results is the assumption of perfect channel state information at the transmitters (CSIT). ...
To the best of our knowledge, so far existing work for the imperfect CSIT focus on the SDoF of the MISO BC with an external eavesdropper under alternating CSIT [10, 68, 102] and on the (MIMO) wiretap ...
doi:10.3390/e19070362
fatcat:dthoc7lilncubcx4d7twsu4ucu
Technical Program
2021
2020 IEEE Information Theory Workshop (ITW)
multiple-access wiretap channel with degraded message sets (GMAC-WT-DMS) equals the capacity of the same model without secrecy constraint. ...
channel with feedback equals the capacity of the same model without secrecy constraint. ...
Channel with Confidential Messages (BCCM) and alternating Channel State Information at the Transmitter (CSIT) is investigated. ...
doi:10.1109/itw46852.2021.9457668
fatcat:j425ygeajrbd5esztbe5zgygty
Wireless Physical Layer Security with CSIT Uncertainty EXAMINATION COMMITTEE PAGE
2017
unpublished
We also discuss the broadcast channel with confidential messages (BCCM) where the transmitter has one common message to be transmitted to two users and one secret message intended to only one of them. ...
We investigate both the single-user multiple-input multiple-output (MIMO) wiretap channel and the multiuser broadcast wiretap channel. ...
the block fading multi-user broadcast wiretap channel with perfect main CSIT is given by
eavesdropper with the strongest wiretapping channel. ...
fatcat:lqg4wuqdybgm5oznhzubdgctxy
On deterministic models for capacity approximations in interference networks and information theoretic security
[article]
2018
This channel model is an example of a multi-user interference-affected network. ...
This work considers two major challenges of modern wireless communication. The first challenge is the analysis and management of interference in multi-user wireless channels. ...
In [XU12] and [XU13] , the real IA approach was used on the wiretap channel with a helper (with and without CSIT, respectively) to investigate the s.d.o.f, therefore achieve results for the infinite ...
doi:10.14279/depositonce-7149
fatcat:jp6aexq2lrbwrbwfms7uhfafnu