A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
2016
IEEE Transactions on Information Forensics and Security
This paper is the first one which considers the problem as a whole and derives a jointly optimal coding and storage allocation scheme, which achieves perfect secrecy with minimum cost. ...
For a user to store data in the cloud, using services provided by multiple cloud storage providers (CSPs) is a promising approach to increase the level of data availability and confidentiality, as it is ...
In summary, to design the storage application using multiple clouds with consideration of (1), (2) and (3) , we need to find a jointly optimal coding and allocation scheme. ...
doi:10.1109/tifs.2015.2500193
fatcat:6zodhlbiajcohbpsf7xx7eq2qu
Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT with Multiple Access Mobile Edge Computing in Smart City
2019
IEEE Access
secrecy, low-computational complexity, and resource consumption, and good adaptation for channel changes. ...
Specifically, we investigate the secure wiretap coding, resource allocation, signal processing, and multi-node cooperation, along with physical layer key generation and authentication, to cope with the ...
In the family of error-control coding, low-density parity-check (LDPC) codes and polar codes play very important roles in coding for secrecy. ...
doi:10.1109/access.2019.2913438
fatcat:bk2b4tiy4jf5pmrmtpu72w5x7a
A Survey of Optimization Approaches for Wireless Physical Layer Security
[article]
2019
arXiv
pre-print
The topics on physical-layer security designs are then summarized from resource allocation, beamforming/precoding, and antenna/node selection and cooperation. ...
Based on the aforementioned schemes, the performance metrics and fundamental optimization problems are discussed, which are generally adopted in security designs. ...
Power allocation can also be optimized for secrecy improvements in this strategy. ...
arXiv:1901.07955v1
fatcat:3pb27rlc45c3dmnjgwmjyspvb4
Capacity Bounds for Wireless Ergodic Fading Broadcast Channels with Partial CSIT
[article]
2013
arXiv
pre-print
In the case of perfect CSIT, a full characterization of the secrecy capacity region is derived for the channel with common and confidential messages. ...
It is shown that the derived outer bound is optimal for the channel with perfect CSIT as well as for some special cases with partial CSIT. ...
For this case, the portion of power allocated to the cloud center signal is ( ) ( ) and that allocated to the satellite is ( ) ( ). ...
arXiv:1302.5696v1
fatcat:qvncr5r45bfv7puktofiji7wiy
A New Green Prospective of Non-orthogonal Multiple Access (NOMA) for 5G
2020
Information
These schemes will result in an optimal scenario in which the energy generated for communication is managed sustainably. ...
Finally, challenges and emerging research trends, for energy efficient NOMA are discussed. ...
Furthermore, an energy optimization problem is addressed using joint user scheduling and power allocation scheme by considering both perfect CSI and imperfect CSI in [32] for downlink NOMA heterogeneous ...
doi:10.3390/info11020089
fatcat:dbjha23zqfg3hb5inwyfslrcaq
2019 Index IEEE Transactions on Communications Vol. 67
2019
IEEE Transactions on Communications
., +,Optimal Caching Designs for Perfect, Imperfect, and Unknown File Popularity Distributions in Large-Scale Multi-Tier Wireless Networks. ...
., +, TCOMM May 2019 3496-3511 Joint Optimization of Computational Cost and Devices Energy for Task Offloading in Multi-Tier Edge-Clouds. ...
doi:10.1109/tcomm.2019.2963622
fatcat:qd6so3reavde3eiukfknmpbfsu
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret ...
Distributed Storage Coding A recent avenue for coding theory research is the design of resilient codes for distributed data and cloud storage systems. ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret ...
Distributed Storage Coding A recent avenue for coding theory research is the design of resilient codes for distributed data and cloud storage systems. ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security
2022
Sensors
The research directions for secure system designs and optimization problems are then reviewed in terms of signal processing, resource allocation and node/antenna selection. ...
In this context, the ML- and AI-based solutions that pertain to end-to-end physical layer joint optimization, secure resource allocation and signal processing methods are presented. ...
Acknowledgments: We would like to acknowledge the Northwestern Polytechnical University (NWPU) and Yangtze River Delta Research Institute of NWPU for their research funding. ...
doi:10.3390/s22093589
pmid:35591279
pmcid:PMC9100781
fatcat:shioc6hcjzeghhlamyhe6axwwe
Adaptive Secure Transmission Strategy for Industrial Wireless Edge-Enabled CPS
2021
IEEE Access
According to changes in the communication environment, the proposed scheme adaptively obtains the corresponding optimal power allocations and wiretap code rates. ...
The optimal power allocation for minimizing the SOP is derived through the efficient alternating optimization algorithm with numerical methods. ...
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their excellent suggestions. ...
doi:10.1109/access.2021.3058603
fatcat:2btthl6r4vdjln5dhdz5iuzxhu
The Chief Security Officer Problem
[article]
2012
arXiv
pre-print
(2) What is the power allocation strategy that the CSO needs to follow so as to maximize the secrecy capacity? ...
(3) How can agents cooperate with one another in order to increase the overall secrecy capacity?. ...
A strategy for enhancing secrecy capacity through cooperation is proposed and its optimality in terms of maximizing the secrecy capacity has been proved. ...
arXiv:1208.4368v1
fatcat:ahb6pbiokfgqlgxdgmcgordt7q
Interplay Between NOMA and Other Emerging Technologies: A Survey
[article]
2019
arXiv
pre-print
Non-orthogonal multiple access (NOMA) has been widely recognized as a promising way to scale up the number of users, enhance the spectral efficiency, and improve the user fairness in wireless networks, ...
NOMA can be flexibly combined with many existing wireless technologies and emerging ones including multiple-input multiple-output (MIMO), massive MIMO, millimeter wave communications, cognitive and cooperative ...
This simple suboptimal approach tends to be asymptotically optimal in the massive MIMO case [16] and eliminates all the inter-user interference under perfect CSI. ...
arXiv:1903.10489v2
fatcat:4u6soepjfjeiply4v2e2luionm
2020 Index IEEE Transactions on Wireless Communications Vol. 19
2020
IEEE Transactions on Wireless Communications
Identification for MIMO Systems in Dynamic Environments; TWC June 2020 3643-3657 Huang, C., see Yang, M., TWC Sept. 2020 5860-5874 Huang, D., Tao, X., Jiang, C., Cui, S., and Lu, J ...
., and Saad, W., Joint Access and Backhaul Resource Management in Satellite-Drone Networks: A Competitive Market Approach; TWC June 2020 3908-3923 Hu, Y.H., see Xia, M., TWC June 2020 3769-3781 Hua, ...
Edge and Central Cloud Computing: A Perfect Pairing for High Energy Efficiency and Low-Latency. ...
doi:10.1109/twc.2020.3044507
fatcat:ie4rwz4dgvaqbaxf3idysubc54
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions
2019
IEEE Communications Surveys and Tutorials
In [219] , authors studied the optimal design of allocated power, decoding order, and transmission rate for maintaining secrecy in PD-NOMA. ...
Moreover, authors formulated an optimization problem of joint sub-carrier and power allocation to increase secrecy rate in DL PD-NOMA HetNet with multiple eavesdroppers. ...
doi:10.1109/comst.2019.2933899
fatcat:bulfng6levdelgmel7oxoi6pna
Capacity and Security of Heterogeneous Distributed Storage Systems
2013
IEEE Journal on Selected Areas in Communications
Moreover, we study the case in which nodes may be compromised by an eavesdropper, and give bounds on the system secrecy capacity. ...
Examples of these systems include peer-to-peer storage clouds, wireless, and Internet caching systems. ...
While the optimality of symmetric repair is known for the special case of MDS codes [11] , our results assert that symmetric repair is always optimal for any choice of system parameters. ...
doi:10.1109/jsac.2013.131210
fatcat:6462vebonba7li4igvu2lmbxfq
« Previous
Showing results 1 — 15 out of 1,400 results