Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,460 Hits in 5.2 sec

Perfect Secrecy in Physical Layer Network Coding Systems from Structured Interference [article]

David Karpuk, Arsenia Chorti
2016 arXiv   pre-print
Physical layer network coding (PNC) has been proposed for next generation networks.  ...  In this contribution, we investigate PNC schemes with embedded perfect secrecy by exploiting structured interference in relay networks with two users and a single relay.  ...  Computing the sizes of the sets X Fig. 1 . 1 Physical layer network coding (PNC) with two transmitter and one relay node.  ... 
arXiv:1507.01098v2 fatcat:lsycikhvrjgljo73smnnhf5gsy

Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference

David A. Karpuk, Arsenia Chorti
2016 IEEE Transactions on Information Forensics and Security  
Physical layer network coding (PNC) has been proposed for next generation networks.  ...  In this contribution, we investigate PNC schemes with embedded perfect secrecy by exploiting structured interference in relay networks with two users and a single relay.  ...  Fig. 1 . 1 Physical layer network coding (PNC) with two transmitter and one relay node.  ... 
doi:10.1109/tifs.2016.2563165 fatcat:rllcoi7xsfdnpgeypmtybm776u

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [article]

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 arXiv   pre-print
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter  ...  Physical Layer Security in Heterogeneous Networks Currently, most works for physical layer security in heterogeneous networks [77] - [82] focus on analyzing the secrecy performance of the networks.  ... 
arXiv:1801.05227v1 fatcat:gktqlyt4wrfhnjdxfvl3vlmhau

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 IEEE Journal on Selected Areas in Communications  
physical layer deserves to receive more attention from the research community.  ...  which can be used in practical communication systems is still challenging.  ...  Physical Layer Security in Heterogeneous Networks Currently, most works for physical layer security in heterogeneous networks [77] [78] [79] [80] [81] [82] focus on analyzing the secrecy performance  ... 
doi:10.1109/jsac.2018.2825560 fatcat:nanjj67ilvdcfbmfpmo7zppqvy

The Physical Layer Security Beamforming Method based on Large-scale Multi-antenna

Zhou Wen-gang, Li Jing, Guo Hui-ling
2016 International Journal of Future Generation Communication and Networking  
Correspondingly, a variety of physical layer security technology. 1) Channel coding security encryption technology.  ...  Network security with encryption and decryption technology to complete the application layer, but this technology will bring computing resources and a waste of energy, particularly in these two resources  ...  Acknowledgments This work is supported by the research projects of Henan province under Grant 162102210395, the science and technology innovation team in Colleges and universities of Henan province plan  ... 
doi:10.14257/ijfgcn.2016.9.7.29 fatcat:2yw7mn3bqfeahfq3ih3gd5ywda

Physical Layer Security: A Paradigm Shift in Data Confidentiality [chapter]

Arsenia Chorti, Camilla Hollanti, Jean-Claude Belfiore, Harold Vincent Poor
2015 Lecture Notes in Electrical Engineering  
Physical layer security (PLS) draws on information theory to characterize the fundamental ability of the wireless physical layer to ensure data confidentiality.  ...  In the PLS framework it has been established that it is possible to simultaneously achieve reliability in transmitting messages to an intended destination and perfect secrecy of those messages with respect  ...  eavesdroppers by coding at the physical-layer itself.  ... 
doi:10.1007/978-3-319-23609-4_1 fatcat:t3hwjd6kqjasli74zj7s6rxcbe

An Overview of Physical Layer Security With Finite-Alphabet Signaling

Sina Rezaei Aghdam, Alireza Nooraiepour, Tolga M. Duman
2019 IEEE Communications Surveys and Tutorials  
Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade.  ...  Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security.  ...  Specifically, punctured LDPC codes are exploited for physical layer security in [30] .  ... 
doi:10.1109/comst.2018.2880421 fatcat:y4kxllk6jrbhjoztuq4hxynzrm

Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT with Multiple Access Mobile Edge Computing in Smart City

Dong Wang, Bo Bai, Kai Lei, Wenbo Zhao, Yanping Yang, Zhu Han
2019 IEEE Access  
Therefore, in this paper, the solutions to address the security threats are investigated from physical layer perspectives, since physical layer security technologies have the advantages of achieving perfect  ...  Specifically, we investigate the secure wiretap coding, resource allocation, signal processing, and multi-node cooperation, along with physical layer key generation and authentication, to cope with the  ...  network security from the physical layer.  ... 
doi:10.1109/access.2019.2913438 fatcat:bk2b4tiy4jf5pmrmtpu72w5x7a

A Survey of Optimization Approaches for Wireless Physical Layer Security [article]

Dong Wang, Bo Bai, Wenbo Zhao, Zhu Han
2019 arXiv   pre-print
Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry.  ...  The research on physical layer security mainly focuses either on the secrecy capacity/achievable secrecy rate/capacity-equivocation region from the perspective of information theory, or on the security  ...  Technologies, challenges, and solutions in physical layer security are studied from the aspects of wiretap coding, multi-antenna and relay cooperation, physical-layer key generation, and physical-layer  ... 
arXiv:1901.07955v1 fatcat:3pb27rlc45c3dmnjgwmjyspvb4

Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks

Kanapathippillai Cumanan, Hong Xing, Peng Xu, Gan Zheng, Xuchu Dai, Arumugam Nallanathan, Zhiguo Ding, George K. Karagiannidis
2017 IEEE Access  
Physical layer security issues in the rapidly developed cooperative networks such as device-to-device systems, relay networks etc., have already drawn significant attention and inter alia, CJ has been  ...  well as opportunities for physical layer security begin arising in these WEH-enabled networks.  ... 
doi:10.1109/access.2016.2636239 fatcat:rc6jlwg43jh4pe7bj6utnurxfa

Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks [article]

Kanapathippillai Cumanan, Hong Xing, Peng Xu, Gan Zheng, Xuchu Dai, Arumugam Nallanathan, Zhiguo Ding, George K. Karagiannidis
2017 arXiv   pre-print
Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks.  ...  In addition to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance secured wireless links.  ...  Physical layer security issues in the rapidly developed cooperative networks such as device-to-device systems, relay networks etc., have already drawn significant attention and inter alia, CJ has been  ... 
arXiv:1701.05764v1 fatcat:nqtnrepoxjb3pkrhaqhgpnynsi

Wireless physical layer security

H. Vincent Poor, Rafael F. Schaefer
2016 Proceedings of the National Academy of Sciences of the United States of America  
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems.  ...  layer to provide security in wireless networks.  ...  This work was supported in part by the US National Science Foundation under Grants CMMI-1435778 and ECCS-1647198 and in part by the German Research Foundation under Grant WY 151/2-1.  ... 
doi:10.1073/pnas.1618130114 pmid:28028211 pmcid:PMC5224364 fatcat:arb5vh24l5cjvpfgaeg3uedysy

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks.  ...  We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference  ...  Network Coding While the emerging area of network coding is not directly related to traditional channel coding design per se, we briefly mention physical layer security issues encountered in this field  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

An Overview of Physical Layer Security with Finite-Alphabet Signaling [article]

Sina Rezaei Aghdam, Alireza Nooraiepour, Tolga M. Duman
2018 arXiv   pre-print
Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade.  ...  Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security.  ...  PHYSICAL LAYER SECURITY FOR NEXT GENERATION WIRELESS SYSTEMSWith the advent of the next generation wireless communication systems such as 5G, a tremendous growth is expected in the number of connected  ... 
arXiv:1802.06401v2 fatcat:ribkfxbb7bgklf4zvqp2llhayy

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks.  ...  We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference  ...  Network Coding While the emerging area of network coding is not directly related to traditional channel coding design per se, we briefly mention physical layer security issues encountered in this field  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
« Previous Showing results 1 — 15 out of 3,460 results