A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
MIMO Wiretap Channel Under Receiver-Side Power Constraints With Applications to Wireless Power Transfer and Cognitive Radio
2016
IEEE Transactions on Communications
In this paper, we characterize the exact secrecy capacity of the MIMO wiretap channel under transmitter and receiver-side power constraints. ...
We first show that solving this problem is equivalent to solving the secrecy capacity of the wiretap channel under a double-sided correlation matrix constraint on the channel input. ...
solving the secrecy capacity of a MIMO wiretap channel under a double-sided correlation matrix constraint on the channel input at the transmitter. ...
doi:10.1109/tcomm.2016.2593739
fatcat:mxsdch2orbesxl3nd66zv2m46q
Enhancing physical layer security via channel feedback: a survey
2020
EURASIP Journal on Wireless Communications and Networking
scheme for source coding with side information. ...
Physical layer security (PLS), which is based on information-theoretic principles of message confidentiality, has attracted considerable attention in recent years. ...
the dirty paper wiretap feedback channel), and the secrecy capacity equals the capacity of the dirty paper channel with noiseless feedback, i.e., the secrecy constraint does not reduce the capacity. ...
doi:10.1186/s13638-020-01673-w
fatcat:jxaeqrl23bgtnjh2jwskekfspe
On The Compound MIMO Wiretap Channel with Mean Feedback
[article]
2017
arXiv
pre-print
Compound MIMO wiretap channel with double sided uncertainty is considered under channel mean information model. ...
We show that the saddle point property holds under mean information model, and thus, compound secrecy capacity equals to the worst case capacity over the class of uncertainty. ...
INTRODUCTION A key consideration in determining the secrecy capacity of the MIMO wiretap channel is the amount of information available at the transmitter, not only about the eavesdropper channel, but ...
arXiv:1701.07518v4
fatcat:h4bkfi6ybrarxg72okahyxme6a
Secret writing on dirty paper: A deterministic view
2011
2011 IEEE International Symposium on Information Theory Proceedings
In this paper, we take a deterministic view and revisit the problem of wiretap channel with side information. ...
A precise characterization of the secrecy capacity is obtained for a linear deterministic model, which naturally suggests a coding scheme which we show to achieve the secrecy capacity of the degraded Gaussian ...
ACKNOWLEDGMENT This research was supported in part by the National Science Foundation under Grant CCF-08-45848, by the European Commission in the framework of the FP7 Network of Excellence in Wireless ...
doi:10.1109/isit.2011.6034009
dblp:conf/isit/El-HalabiLGS11
fatcat:acse3kk7fjccbfkqkfvfxwwyfm
Gaussian MIMO wiretap channel under receiver side power constraints
2014
2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)
We first show that solving this problem is equivalent to solving the secrecy capacity of a wiretap channel with a double-sided correlation matrix constraint on the channel input. ...
In this paper, we characterize the exact secrecy capacity of the MIMO wiretap channel under transmitter and receiver-side power constraints. ...
to solving the secrecy capacity of a MIMO wiretap channel under a double-sided correlation matrix constraint on the channel input at the transmitter. ...
doi:10.1109/allerton.2014.7028454
dblp:conf/allerton/BanawanU14
fatcat:i5dlttxfzjcqvfvj2x2kfzjfrq
On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis
[chapter]
2014
Lecture Notes in Computer Science
Based on this characterization, we address the problem of covariance optimization at the transmitter. ...
In this work, we consider MIMO wiretap channels in a fast fading environment, for which the overall performance is characterized by the ergodic MIMO secrecy rate. ...
In the context of MIMO channels, in [19] , following a previous work in [20] , the authors characterize the secrecy capacity of an uncorrelated MIMOME channel with only statistical channel state information ...
doi:10.1007/978-3-319-04268-8_6
fatcat:jskqw2vdxvhfrjykwtuh6ole4u
On the use of secret keys in broadcast channels with receiver side information
2014
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Index Terms-Broadcast channel with receiver side information, strong secrecy, secret key, capacity region. ...
The use of secret keys in broadcast channels with receiver side information is studied. ...
Then, [15] established the secrecy capacity of the wiretap channel with shared key for the case of no distortion allowed at the legitimate receiver. ...
doi:10.1109/icassp.2014.6853864
dblp:conf/icassp/SchaeferKB14
fatcat:khklnlj2pfeyderjyedjf37pqi
Secrecy capacity over correlated ergodic fading channel
2008
MILCOM 2008 - 2008 IEEE Military Communications Conference
We investigate the secrecy capacity of an ergodic fading wiretap channel in which the main channel is correlated with the eavesdropper channel. ...
On the contrary, the secrecy capacity converges to a limit which can be an upper bound on the secrecy capacity over the fading wiretap channel. ...
In his work, the maximum information rate of the main channel with the total ignorance at the wiretapper is defined as secrecy capacity, and he proved the existence of channel codes achieving the secrecy ...
doi:10.1109/milcom.2008.4753256
fatcat:xt3n2g4izbbl5oehut4kztzztu
On the Secrecy Capacity of the Multiple-Antenna Wiretap Channel with Limited CSI Feedback
2015
2015 IEEE Global Communications Conference (GLOBECOM)
We study the ergodic secrecy capacity of a blockfading wiretap channel when there are multiple antennas at the transmitter, the legitimate receiver and the eavesdropper. ...
We consider that the receivers are aware of their respective channel matrices while the transmitter is only provided by a B-bits feedback of the main channel state information. ...
Assuming full CSI on the receivers' side and an average power constraint at the transmitter, we presented an achievable secrecy rate and an upper bound on the ergodic secrecy capacity when the feedback ...
doi:10.1109/glocom.2015.7417635
fatcat:w4dphbchxrellbsgbxorbpy6hm
On the Secrecy Capacity of the Multiple-Antenna Wiretap Channel with Limited CSI Feedback
2014
2015 IEEE Global Communications Conference (GLOBECOM)
We study the ergodic secrecy capacity of a blockfading wiretap channel when there are multiple antennas at the transmitter, the legitimate receiver and the eavesdropper. ...
We consider that the receivers are aware of their respective channel matrices while the transmitter is only provided by a B-bits feedback of the main channel state information. ...
Assuming full CSI on the receivers' side and an average power constraint at the transmitter, we presented an achievable secrecy rate and an upper bound on the ergodic secrecy capacity when the feedback ...
doi:10.1109/glocom.2014.7417635
dblp:conf/globecom/HyadiRA15
fatcat:klizi4pisbgjzgtv7fsj7td774
Low-Complexity Power Control and Energy Harvesting Algorithms for Wiretap Channels Employing Finite-Alphabet Input Schemes
2018
IEEE Transactions on Information Forensics and Security
On the transmitter side, we investigate the optimal power control policy for secrecy rate maximization over wiretap channels with the bit-interleaved coded modulation (BICM) scheme. ...
Abstract-We discuss the design rules of an energy-efficient wireless wiretap channel in this paper. ...
channel on average, provided perfect global channel state information (CSI) is available at the transmitter. ...
doi:10.1109/tifs.2017.2749161
fatcat:rj4sejr6kvcrbpve4u3i5sn7ai
Secure Joint Source-Channel Coding With Side Information
[article]
2010
arXiv
pre-print
In this work, the problem of transmitting an i.i.d Gaussian source over an i.i.d Gaussian wiretap channel with an i.i.d Gaussian side information is considered. ...
It is shown that for the problem of communicating a Gaussian source over a Gaussian wiretap channel with side information, there exists an infinite family of optimum secure joint source-channel coding ...
Both of these two secrecy capacities are clearly upper bounds on the secrecy capacity for the original wiretap channel with side information. ...
arXiv:1008.0223v1
fatcat:i4podmvfhnemfmy3tgjmbvtm6y
Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel
2009
IEEE Transactions on Information Theory
We find the secrecy capacity of the 2-2-1 Gaussian MIMO wire-tap channel, which consists of a transmitter and a receiver with two antennas each, and an eavesdropper with a single antenna. ...
We determine the secrecy capacity of this channel by proposing an achievable scheme and then developing a tight upper bound that meets the proposed achievable secrecy rate. ...
An upper bound on the secrecy capacity of the wiretap channel described in (1) and (2) Intuitively, the upper bound is obtained by considering the secrecy capacity of a new channel where the legitimate ...
doi:10.1109/tit.2009.2025549
fatcat:w7y6wxtzyzbn5ovmqibgvm6qhu
On the secrecy of the cognitive interference channel with partial channel states
2016
Transactions on Emerging Telecommunications Technologies
He assumed the channel side information at the transmitter (CSIT). ...
The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. ...
They extended their results to the Gaussian wiretap channel with side information using the dirty paper coding technique. ...
doi:10.1002/ett.3075
fatcat:ep6kqeosafaq7f5wizuk6fdmpq
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
[article]
2018
arXiv
pre-print
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. ...
Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed. ...
Therefore, these information bits are not transmitted through the channel but can be decoded at the receiver side based on the non-punctured part of the codeword. ...
arXiv:1801.05227v1
fatcat:gktqlyt4wrfhnjdxfvl3vlmhau
« Previous
Showing results 1 — 15 out of 1,171 results