Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,400 Hits in 4.1 sec

Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds

Ping Hu, Chi Wan Sung, Siu-Wai Ho, Terence H. Chan
2016 IEEE Transactions on Information Forensics and Security  
This paper is the first one which considers the problem as a whole and derives a jointly optimal coding and storage allocation scheme, which achieves perfect secrecy with minimum cost.  ...  For a user to store data in the cloud, using services provided by multiple cloud storage providers (CSPs) is a promising approach to increase the level of data availability and confidentiality, as it is  ...  In summary, to design the storage application using multiple clouds with consideration of (1), (2) and (3) , we need to find a jointly optimal coding and allocation scheme.  ... 
doi:10.1109/tifs.2015.2500193 fatcat:6zodhlbiajcohbpsf7xx7eq2qu

Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT with Multiple Access Mobile Edge Computing in Smart City

Dong Wang, Bo Bai, Kai Lei, Wenbo Zhao, Yanping Yang, Zhu Han
2019 IEEE Access  
secrecy, low-computational complexity, and resource consumption, and good adaptation for channel changes.  ...  Specifically, we investigate the secure wiretap coding, resource allocation, signal processing, and multi-node cooperation, along with physical layer key generation and authentication, to cope with the  ...  In the family of error-control coding, low-density parity-check (LDPC) codes and polar codes play very important roles in coding for secrecy.  ... 
doi:10.1109/access.2019.2913438 fatcat:bk2b4tiy4jf5pmrmtpu72w5x7a

A Survey of Optimization Approaches for Wireless Physical Layer Security [article]

Dong Wang, Bo Bai, Wenbo Zhao, Zhu Han
2019 arXiv   pre-print
The topics on physical-layer security designs are then summarized from resource allocation, beamforming/precoding, and antenna/node selection and cooperation.  ...  Based on the aforementioned schemes, the performance metrics and fundamental optimization problems are discussed, which are generally adopted in security designs.  ...  Power allocation can also be optimized for secrecy improvements in this strategy.  ... 
arXiv:1901.07955v1 fatcat:3pb27rlc45c3dmnjgwmjyspvb4

Capacity Bounds for Wireless Ergodic Fading Broadcast Channels with Partial CSIT [article]

Reza K. Farsani
2013 arXiv   pre-print
In the case of perfect CSIT, a full characterization of the secrecy capacity region is derived for the channel with common and confidential messages.  ...  It is shown that the derived outer bound is optimal for the channel with perfect CSIT as well as for some special cases with partial CSIT.  ...  For this case, the portion of power allocated to the cloud center signal is ( ) ( ) and that allocated to the satellite is ( ) ( ).  ... 
arXiv:1302.5696v1 fatcat:qvncr5r45bfv7puktofiji7wiy

A New Green Prospective of Non-orthogonal Multiple Access (NOMA) for 5G

Vishaka Basnayake, Dushantha Nalin K. Jayakody, Vishal Sharma, Nikhil Sharma, P. Muthuchidambaranathan, Hakim Mabed
2020 Information  
These schemes will result in an optimal scenario in which the energy generated for communication is managed sustainably.  ...  Finally, challenges and emerging research trends, for energy efficient NOMA are discussed.  ...  Furthermore, an energy optimization problem is addressed using joint user scheduling and power allocation scheme by considering both perfect CSI and imperfect CSI in [32] for downlink NOMA heterogeneous  ... 
doi:10.3390/info11020089 fatcat:dbjha23zqfg3hb5inwyfslrcaq

2019 Index IEEE Transactions on Communications Vol. 67

2019 IEEE Transactions on Communications  
., +,Optimal Caching Designs for Perfect, Imperfect, and Unknown File Popularity Distributions in Large-Scale Multi-Tier Wireless Networks.  ...  ., +, TCOMM May 2019 3496-3511 Joint Optimization of Computational Cost and Devices Energy for Task Offloading in Multi-Tier Edge-Clouds.  ... 
doi:10.1109/tcomm.2019.2963622 fatcat:qd6so3reavde3eiukfknmpbfsu

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret  ...  Distributed Storage Coding A recent avenue for coding theory research is the design of resilient codes for distributed data and cloud storage systems.  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret  ...  Distributed Storage Coding A recent avenue for coding theory research is the design of resilient codes for distributed data and cloud storage systems.  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security

Mulugeta Kassaw Tefera, Zengwang Jin, Shengbing Zhang
2022 Sensors  
The research directions for secure system designs and optimization problems are then reviewed in terms of signal processing, resource allocation and node/antenna selection.  ...  In this context, the ML- and AI-based solutions that pertain to end-to-end physical layer joint optimization, secure resource allocation and signal processing methods are presented.  ...  Acknowledgments: We would like to acknowledge the Northwestern Polytechnical University (NWPU) and Yangtze River Delta Research Institute of NWPU for their research funding.  ... 
doi:10.3390/s22093589 pmid:35591279 pmcid:PMC9100781 fatcat:shioc6hcjzeghhlamyhe6axwwe

Adaptive Secure Transmission Strategy for Industrial Wireless Edge-Enabled CPS

Huanhuan Song, Hong Wen, Qicong Yang, Jie Tang, Yi Chen, Tengyue Zhang, Feiyi Xie, Songlin Chen
2021 IEEE Access  
According to changes in the communication environment, the proposed scheme adaptively obtains the corresponding optimal power allocations and wiretap code rates.  ...  The optimal power allocation for minimizing the SOP is derived through the efficient alternating optimization algorithm with numerical methods.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their excellent suggestions.  ... 
doi:10.1109/access.2021.3058603 fatcat:2btthl6r4vdjln5dhdz5iuzxhu

The Chief Security Officer Problem [article]

Kamesh Namuduri, Li Li, Mahadevan Gomathisankaran, Murali Varanasi
2012 arXiv   pre-print
(2) What is the power allocation strategy that the CSO needs to follow so as to maximize the secrecy capacity?  ...  (3) How can agents cooperate with one another in order to increase the overall secrecy capacity?.  ...  A strategy for enhancing secrecy capacity through cooperation is proposed and its optimality in terms of maximizing the secrecy capacity has been proved.  ... 
arXiv:1208.4368v1 fatcat:ahb6pbiokfgqlgxdgmcgordt7q

Interplay Between NOMA and Other Emerging Technologies: A Survey [article]

Mojtaba Vaezi, Gayan Amarasuriya, Yuanwei Liu, Ahmed Arafa, Fang Fang,, Zhiguo Ding
2019 arXiv   pre-print
Non-orthogonal multiple access (NOMA) has been widely recognized as a promising way to scale up the number of users, enhance the spectral efficiency, and improve the user fairness in wireless networks,  ...  NOMA can be flexibly combined with many existing wireless technologies and emerging ones including multiple-input multiple-output (MIMO), massive MIMO, millimeter wave communications, cognitive and cooperative  ...  This simple suboptimal approach tends to be asymptotically optimal in the massive MIMO case [16] and eliminates all the inter-user interference under perfect CSI.  ... 
arXiv:1903.10489v2 fatcat:4u6soepjfjeiply4v2e2luionm

2020 Index IEEE Transactions on Wireless Communications Vol. 19

2020 IEEE Transactions on Wireless Communications  
Identification for MIMO Systems in Dynamic Environments; TWC June 2020 3643-3657 Huang, C., see Yang, M., TWC Sept. 2020 5860-5874 Huang, D., Tao, X., Jiang, C., Cui, S., and Lu, J  ...  ., and Saad, W., Joint Access and Backhaul Resource Management in Satellite-Drone Networks: A Competitive Market Approach; TWC June 2020 3908-3923 Hu, Y.H., see Xia, M., TWC June 2020 3769-3781 Hua,  ...  Edge and Central Cloud Computing: A Perfect Pairing for High Energy Efficiency and Low-Latency.  ... 
doi:10.1109/twc.2020.3044507 fatcat:ie4rwz4dgvaqbaxf3idysubc54

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
In [219] , authors studied the optimal design of allocated power, decoding order, and transmission rate for maintaining secrecy in PD-NOMA.  ...  Moreover, authors formulated an optimization problem of joint sub-carrier and power allocation to increase secrecy rate in DL PD-NOMA HetNet with multiple eavesdroppers.  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Capacity and Security of Heterogeneous Distributed Storage Systems

Toni Ernvall, Salim El Rouayheb, Camilla Hollanti, H. Vincent Poor
2013 IEEE Journal on Selected Areas in Communications  
Moreover, we study the case in which nodes may be compromised by an eavesdropper, and give bounds on the system secrecy capacity.  ...  Examples of these systems include peer-to-peer storage clouds, wireless, and Internet caching systems.  ...  While the optimality of symmetric repair is known for the special case of MDS codes [11] , our results assert that symmetric repair is always optimal for any choice of system parameters.  ... 
doi:10.1109/jsac.2013.131210 fatcat:6462vebonba7li4igvu2lmbxfq
« Previous Showing results 1 — 15 out of 1,400 results