Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,171 Hits in 3.9 sec

MIMO Wiretap Channel Under Receiver-Side Power Constraints With Applications to Wireless Power Transfer and Cognitive Radio

Karim Banawan, Sennur Ulukus
2016 IEEE Transactions on Communications  
In this paper, we characterize the exact secrecy capacity of the MIMO wiretap channel under transmitter and receiver-side power constraints.  ...  We first show that solving this problem is equivalent to solving the secrecy capacity of the wiretap channel under a double-sided correlation matrix constraint on the channel input.  ...  solving the secrecy capacity of a MIMO wiretap channel under a double-sided correlation matrix constraint on the channel input at the transmitter.  ... 
doi:10.1109/tcomm.2016.2593739 fatcat:mxsdch2orbesxl3nd66zv2m46q

Enhancing physical layer security via channel feedback: a survey

Bin Dai, Chong Li, Yingbin Liang, H. Vincent Poor, Shlomo Shamai (Shitz)
2020 EURASIP Journal on Wireless Communications and Networking  
scheme for source coding with side information.  ...  Physical layer security (PLS), which is based on information-theoretic principles of message confidentiality, has attracted considerable attention in recent years.  ...  the dirty paper wiretap feedback channel), and the secrecy capacity equals the capacity of the dirty paper channel with noiseless feedback, i.e., the secrecy constraint does not reduce the capacity.  ... 
doi:10.1186/s13638-020-01673-w fatcat:jxaeqrl23bgtnjh2jwskekfspe

On The Compound MIMO Wiretap Channel with Mean Feedback [article]

Amr Abdelaziz, C. Emre Koksal, Hesham El Gamal, Ashraf D. Elbayoumy
2017 arXiv   pre-print
Compound MIMO wiretap channel with double sided uncertainty is considered under channel mean information model.  ...  We show that the saddle point property holds under mean information model, and thus, compound secrecy capacity equals to the worst case capacity over the class of uncertainty.  ...  INTRODUCTION A key consideration in determining the secrecy capacity of the MIMO wiretap channel is the amount of information available at the transmitter, not only about the eavesdropper channel, but  ... 
arXiv:1701.07518v4 fatcat:h4bkfi6ybrarxg72okahyxme6a

Secret writing on dirty paper: A deterministic view

Mustafa El-Halabi, Tie Liu, Costas Georghiades, Shlomo Shamai
2011 2011 IEEE International Symposium on Information Theory Proceedings  
In this paper, we take a deterministic view and revisit the problem of wiretap channel with side information.  ...  A precise characterization of the secrecy capacity is obtained for a linear deterministic model, which naturally suggests a coding scheme which we show to achieve the secrecy capacity of the degraded Gaussian  ...  ACKNOWLEDGMENT This research was supported in part by the National Science Foundation under Grant CCF-08-45848, by the European Commission in the framework of the FP7 Network of Excellence in Wireless  ... 
doi:10.1109/isit.2011.6034009 dblp:conf/isit/El-HalabiLGS11 fatcat:acse3kk7fjccbfkqkfvfxwwyfm

Gaussian MIMO wiretap channel under receiver side power constraints

Karim Banawan, Sennur Ulukus
2014 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)  
We first show that solving this problem is equivalent to solving the secrecy capacity of a wiretap channel with a double-sided correlation matrix constraint on the channel input.  ...  In this paper, we characterize the exact secrecy capacity of the MIMO wiretap channel under transmitter and receiver-side power constraints.  ...  to solving the secrecy capacity of a MIMO wiretap channel under a double-sided correlation matrix constraint on the channel input at the transmitter.  ... 
doi:10.1109/allerton.2014.7028454 dblp:conf/allerton/BanawanU14 fatcat:i5dlttxfzjcqvfvj2x2kfzjfrq

On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis [chapter]

Maksym A. Girnyk, Frédéric Gabry, Mikko Vehkaperä, Lars K. Rasmussen, Mikael Skoglund
2014 Lecture Notes in Computer Science  
Based on this characterization, we address the problem of covariance optimization at the transmitter.  ...  In this work, we consider MIMO wiretap channels in a fast fading environment, for which the overall performance is characterized by the ergodic MIMO secrecy rate.  ...  In the context of MIMO channels, in [19] , following a previous work in [20] , the authors characterize the secrecy capacity of an uncorrelated MIMOME channel with only statistical channel state information  ... 
doi:10.1007/978-3-319-04268-8_6 fatcat:jskqw2vdxvhfrjykwtuh6ole4u

On the use of secret keys in broadcast channels with receiver side information

Rafael F. Schaefer, Ashish Khisti, Holger Boche
2014 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
Index Terms-Broadcast channel with receiver side information, strong secrecy, secret key, capacity region.  ...  The use of secret keys in broadcast channels with receiver side information is studied.  ...  Then, [15] established the secrecy capacity of the wiretap channel with shared key for the case of no distortion allowed at the legitimate receiver.  ... 
doi:10.1109/icassp.2014.6853864 dblp:conf/icassp/SchaeferKB14 fatcat:khklnlj2pfeyderjyedjf37pqi

Secrecy capacity over correlated ergodic fading channel

Hyoungsuk Jeon, Namshik Kim, Minki Kim, Hyuckjae Lee, Jeongseok Ha
2008 MILCOM 2008 - 2008 IEEE Military Communications Conference  
We investigate the secrecy capacity of an ergodic fading wiretap channel in which the main channel is correlated with the eavesdropper channel.  ...  On the contrary, the secrecy capacity converges to a limit which can be an upper bound on the secrecy capacity over the fading wiretap channel.  ...  In his work, the maximum information rate of the main channel with the total ignorance at the wiretapper is defined as secrecy capacity, and he proved the existence of channel codes achieving the secrecy  ... 
doi:10.1109/milcom.2008.4753256 fatcat:xt3n2g4izbbl5oehut4kztzztu

On the Secrecy Capacity of the Multiple-Antenna Wiretap Channel with Limited CSI Feedback

Amal Hyadi, Zouheir Rezki, Mohamed-Slim Alouini
2015 2015 IEEE Global Communications Conference (GLOBECOM)  
We study the ergodic secrecy capacity of a blockfading wiretap channel when there are multiple antennas at the transmitter, the legitimate receiver and the eavesdropper.  ...  We consider that the receivers are aware of their respective channel matrices while the transmitter is only provided by a B-bits feedback of the main channel state information.  ...  Assuming full CSI on the receivers' side and an average power constraint at the transmitter, we presented an achievable secrecy rate and an upper bound on the ergodic secrecy capacity when the feedback  ... 
doi:10.1109/glocom.2015.7417635 fatcat:w4dphbchxrellbsgbxorbpy6hm

On the Secrecy Capacity of the Multiple-Antenna Wiretap Channel with Limited CSI Feedback

Amal Hyadi, Zouheir Rezki, Mohamed-Slim Alouini
2014 2015 IEEE Global Communications Conference (GLOBECOM)  
We study the ergodic secrecy capacity of a blockfading wiretap channel when there are multiple antennas at the transmitter, the legitimate receiver and the eavesdropper.  ...  We consider that the receivers are aware of their respective channel matrices while the transmitter is only provided by a B-bits feedback of the main channel state information.  ...  Assuming full CSI on the receivers' side and an average power constraint at the transmitter, we presented an achievable secrecy rate and an upper bound on the ergodic secrecy capacity when the feedback  ... 
doi:10.1109/glocom.2014.7417635 dblp:conf/globecom/HyadiRA15 fatcat:klizi4pisbgjzgtv7fsj7td774

Low-Complexity Power Control and Energy Harvesting Algorithms for Wiretap Channels Employing Finite-Alphabet Input Schemes

Weichen Xiang, Martin Johnston, Stephane Le Goff
2018 IEEE Transactions on Information Forensics and Security  
On the transmitter side, we investigate the optimal power control policy for secrecy rate maximization over wiretap channels with the bit-interleaved coded modulation (BICM) scheme.  ...  Abstract-We discuss the design rules of an energy-efficient wireless wiretap channel in this paper.  ...  channel on average, provided perfect global channel state information (CSI) is available at the transmitter.  ... 
doi:10.1109/tifs.2017.2749161 fatcat:rj4sejr6kvcrbpve4u3i5sn7ai

Secure Joint Source-Channel Coding With Side Information [article]

Ghadamali Bagherikaram, Konstantinos N. Plataniotis
2010 arXiv   pre-print
In this work, the problem of transmitting an i.i.d Gaussian source over an i.i.d Gaussian wiretap channel with an i.i.d Gaussian side information is considered.  ...  It is shown that for the problem of communicating a Gaussian source over a Gaussian wiretap channel with side information, there exists an infinite family of optimum secure joint source-channel coding  ...  Both of these two secrecy capacities are clearly upper bounds on the secrecy capacity for the original wiretap channel with side information.  ... 
arXiv:1008.0223v1 fatcat:i4podmvfhnemfmy3tgjmbvtm6y

Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel

Shabnam Shafiee, Nan Liu, Sennur Ulukus
2009 IEEE Transactions on Information Theory  
We find the secrecy capacity of the 2-2-1 Gaussian MIMO wire-tap channel, which consists of a transmitter and a receiver with two antennas each, and an eavesdropper with a single antenna.  ...  We determine the secrecy capacity of this channel by proposing an achievable scheme and then developing a tight upper bound that meets the proposed achievable secrecy rate.  ...  An upper bound on the secrecy capacity of the wiretap channel described in (1) and (2) Intuitively, the upper bound is obtained by considering the secrecy capacity of a new channel where the legitimate  ... 
doi:10.1109/tit.2009.2025549 fatcat:w7y6wxtzyzbn5ovmqibgvm6qhu

On the secrecy of the cognitive interference channel with partial channel states

Hamid G. Bafghi, Babak Seyfe, Mahtab Mirmohseni, Mohammad Reza Aref
2016 Transactions on Emerging Telecommunications Technologies  
He assumed the channel side information at the transmitter (CSIT).  ...  The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder.  ...  They extended their results to the Gaussian wiretap channel with side information using the dirty paper coding technique.  ... 
doi:10.1002/ett.3075 fatcat:ep6kqeosafaq7f5wizuk6fdmpq

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [article]

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 arXiv   pre-print
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.  ...  Therefore, these information bits are not transmitted through the channel but can be decoded at the receiver side based on the non-punctured part of the codeword.  ... 
arXiv:1801.05227v1 fatcat:gktqlyt4wrfhnjdxfvl3vlmhau
« Previous Showing results 1 — 15 out of 1,171 results