A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Perfect Secrecy in Physical Layer Network Coding Systems from Structured Interference
[article]
2016
arXiv
pre-print
Physical layer network coding (PNC) has been proposed for next generation networks. ...
In this contribution, we investigate PNC schemes with embedded perfect secrecy by exploiting structured interference in relay networks with two users and a single relay. ...
Computing the sizes of the sets X Fig. 1 . 1 Physical layer network coding (PNC) with two transmitter and one relay node. ...
arXiv:1507.01098v2
fatcat:lsycikhvrjgljo73smnnhf5gsy
Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference
2016
IEEE Transactions on Information Forensics and Security
Physical layer network coding (PNC) has been proposed for next generation networks. ...
In this contribution, we investigate PNC schemes with embedded perfect secrecy by exploiting structured interference in relay networks with two users and a single relay. ...
Fig. 1 . 1 Physical layer network coding (PNC) with two transmitter and one relay node. ...
doi:10.1109/tifs.2016.2563165
fatcat:rllcoi7xsfdnpgeypmtybm776u
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
[article]
2018
arXiv
pre-print
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. ...
This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter ...
Physical Layer Security in Heterogeneous Networks Currently, most works for physical layer security in heterogeneous networks [77] - [82] focus on analyzing the secrecy performance of the networks. ...
arXiv:1801.05227v1
fatcat:gktqlyt4wrfhnjdxfvl3vlmhau
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
2018
IEEE Journal on Selected Areas in Communications
physical layer deserves to receive more attention from the research community. ...
which can be used in practical communication systems is still challenging. ...
Physical Layer Security in Heterogeneous Networks Currently, most works for physical layer security in heterogeneous networks [77] [78] [79] [80] [81] [82] focus on analyzing the secrecy performance ...
doi:10.1109/jsac.2018.2825560
fatcat:nanjj67ilvdcfbmfpmo7zppqvy
The Physical Layer Security Beamforming Method based on Large-scale Multi-antenna
2016
International Journal of Future Generation Communication and Networking
Correspondingly, a variety of physical layer security technology. 1) Channel coding security encryption technology. ...
Network security with encryption and decryption technology to complete the application layer, but this technology will bring computing resources and a waste of energy, particularly in these two resources ...
Acknowledgments This work is supported by the research projects of Henan province under Grant 162102210395, the science and technology innovation team in Colleges and universities of Henan province plan ...
doi:10.14257/ijfgcn.2016.9.7.29
fatcat:2yw7mn3bqfeahfq3ih3gd5ywda
Physical Layer Security: A Paradigm Shift in Data Confidentiality
[chapter]
2015
Lecture Notes in Electrical Engineering
Physical layer security (PLS) draws on information theory to characterize the fundamental ability of the wireless physical layer to ensure data confidentiality. ...
In the PLS framework it has been established that it is possible to simultaneously achieve reliability in transmitting messages to an intended destination and perfect secrecy of those messages with respect ...
eavesdroppers by coding at the physical-layer itself. ...
doi:10.1007/978-3-319-23609-4_1
fatcat:t3hwjd6kqjasli74zj7s6rxcbe
An Overview of Physical Layer Security With Finite-Alphabet Signaling
2019
IEEE Communications Surveys and Tutorials
Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. ...
Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. ...
Specifically, punctured LDPC codes are exploited for physical layer security in [30] . ...
doi:10.1109/comst.2018.2880421
fatcat:y4kxllk6jrbhjoztuq4hxynzrm
Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT with Multiple Access Mobile Edge Computing in Smart City
2019
IEEE Access
Therefore, in this paper, the solutions to address the security threats are investigated from physical layer perspectives, since physical layer security technologies have the advantages of achieving perfect ...
Specifically, we investigate the secure wiretap coding, resource allocation, signal processing, and multi-node cooperation, along with physical layer key generation and authentication, to cope with the ...
network security from the physical layer. ...
doi:10.1109/access.2019.2913438
fatcat:bk2b4tiy4jf5pmrmtpu72w5x7a
A Survey of Optimization Approaches for Wireless Physical Layer Security
[article]
2019
arXiv
pre-print
Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry. ...
The research on physical layer security mainly focuses either on the secrecy capacity/achievable secrecy rate/capacity-equivocation region from the perspective of information theory, or on the security ...
Technologies, challenges, and solutions in physical layer security are studied from the aspects of wiretap coding, multi-antenna and relay cooperation, physical-layer key generation, and physical-layer ...
arXiv:1901.07955v1
fatcat:3pb27rlc45c3dmnjgwmjyspvb4
Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks
2017
IEEE Access
Physical layer security issues in the rapidly developed cooperative networks such as device-to-device systems, relay networks etc., have already drawn significant attention and inter alia, CJ has been ...
well as opportunities for physical layer security begin arising in these WEH-enabled networks. ...
doi:10.1109/access.2016.2636239
fatcat:rc6jlwg43jh4pe7bj6utnurxfa
Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks
[article]
2017
arXiv
pre-print
Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks. ...
In addition to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance secured wireless links. ...
Physical layer security issues in the rapidly developed cooperative networks such as device-to-device systems, relay networks etc., have already drawn significant attention and inter alia, CJ has been ...
arXiv:1701.05764v1
fatcat:nqtnrepoxjb3pkrhaqhgpnynsi
Wireless physical layer security
2016
Proceedings of the National Academy of Sciences of the United States of America
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. ...
layer to provide security in wireless networks. ...
This work was supported in part by the US National Science Foundation under Grants CMMI-1435778 and ECCS-1647198 and in part by the German Research Foundation under Grant WY 151/2-1. ...
doi:10.1073/pnas.1618130114
pmid:28028211
pmcid:PMC5224364
fatcat:arb5vh24l5cjvpfgaeg3uedysy
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference ...
Network Coding While the emerging area of network coding is not directly related to traditional channel coding design per se, we briefly mention physical layer security issues encountered in this field ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
An Overview of Physical Layer Security with Finite-Alphabet Signaling
[article]
2018
arXiv
pre-print
Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. ...
Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. ...
PHYSICAL LAYER SECURITY FOR NEXT GENERATION WIRELESS SYSTEMSWith the advent of the next generation wireless communication systems such as 5G, a tremendous growth is expected in the number of connected ...
arXiv:1802.06401v2
fatcat:ribkfxbb7bgklf4zvqp2llhayy
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference ...
Network Coding While the emerging area of network coding is not directly related to traditional channel coding design per se, we briefly mention physical layer security issues encountered in this field ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
« Previous
Showing results 1 — 15 out of 3,460 results