Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








60 Hits in 5.9 sec

A Survey of Optimization Approaches for Wireless Physical Layer Security [article]

Dong Wang, Bo Bai, Wenbo Zhao, Zhu Han
2019 arXiv   pre-print
The survey begins with typical wiretap channel models to cover common scenarios and systems.  ...  The topics on physical-layer security designs are then summarized from resource allocation, beamforming/precoding, and antenna/node selection and cooperation.  ...  Enhancing physical layer security in multi-antenna systems by beamforming/precoding with or without artificial noise.  ... 
arXiv:1901.07955v1 fatcat:3pb27rlc45c3dmnjgwmjyspvb4

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
, and relay networks.  ...  This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret  ...  The cooperative jamming method of [111] was used in [202] as a precursor to secret key establishment over a two-way wiretap channel, and artificial noise was used to enhance secret key rates in a two-way  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
, and relay networks.  ...  This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret  ...  The cooperative jamming method of [111] was used in [202] as a precursor to secret key establishment over a two-way wiretap channel, and artificial noise was used to enhance secret key rates in a two-way  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

A Survey on Cooperative Jamming Applied to Physical Layer Security

Michael Atallah, Georges Kaddoum, Long Kong
2015 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)  
Security has always played a critical role in wireless cooperative communication systems design. Eavesdropping and jamming are two common threats to the information security in wireless networks.  ...  However, jamming can be used in a cooperative manner to enable a secure communication link between the legitimate transmitter and the intended receiver.  ...  channel state information (CSI) at the destination to minimize the outage probability.  ... 
doi:10.1109/icuwb.2015.7324413 dblp:conf/icuwb/AtallahKK15 fatcat:x6vyqvd4zjfxzfyzzyvbmscb4q

An Overview of Key Technologies in Physical Layer Security

Abraham Sanenga, Galefang Allycan Mapunda, Tshepiso Merapelo Ludo Jacob, Leatile Marata, Bokamoso Basutli, Joseph Monamati Chuma
2020 Entropy  
We start by introducing the basic theories of PLS, including the wiretap channel, information-theoretic security, and a brief discussion of the cryptography security technique.  ...  This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information.  ...  Abbreviations The following abbreviations are used in this manuscript:  ... 
doi:10.3390/e22111261 pmid:33287029 fatcat:ngkceebvprbbbkrwamjzqtwaci

Wireless Physical Layer Security with Imperfect Channel State Information: A Survey [article]

Biao He, Xiangyun Zhou, Thushara D. Abhayapala
2013 arXiv   pre-print
This paper provides a survey of recent research and development in physical layer security considering the imperfect channel state information (CSI) at communication nodes.  ...  nodes or in cognitive radio systems.  ...  for multi-antenna channels, and other signaling designs for relay channels or cognitive radio systems.  ... 
arXiv:1307.4146v2 fatcat:nvho2lziqjep5my2zlibtk6hpm

Secure Transmission in Cooperative Relaying Networks With Multiple Antennas

Yuzhen Huang, Jinlong Wang, Caijun Zhong, Trung Q. Duong, George K. Karagiannidis
2016 IEEE Transactions on Wireless Communications  
In [8] and [9] , the impact of antenna correlation on the secrecy performance of multi-antenna wiretap channels was quantified.  ...  In addition, as a benchmark, cooperative jamming with ZF scheme (CJ/ZF) is also analyzed, where the role of relay node is to send jamming signals to degrade the quality of the eavesdropper's channel.  ...  M provides both diversity order and coding gain.  ... 
doi:10.1109/twc.2016.2591940 fatcat:5th5leqf3fcxhbbkhlva2cmjja

Secure Non-Orthogonal Multiple Access: An Interference Engineering Perspective [article]

Lu Lv, Hai Jiang, Zhiguo Ding, Qiang Ye, Naofal Al-Dhahir, Jian Chen
2020 arXiv   pre-print
In this article, we unleash the potential of network interference and exploit it constructively to enhance physical-layer security in NOMA networks.  ...  However, over a wireless channel, the superimposed NOMA signals are highly susceptible to eavesdropping, potentially leading to severe leakage of confidential information.  ...  In this way, secrecy against the untrusted relay is promised by cooperative jamming without coordination, thereby ensuring low complexity.  ... 
arXiv:2003.13488v2 fatcat:zi66mus2dbhq3djgmzczb3tenm

An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

Amal Hyadi, Zouheir Rezki, Mohamed-Slim Alouini
2016 IEEE Access  
In this vein, it has been shown that fading channels can enhance the transmission of confidential information and that a secure communication can be achieved even when the channel to the eavesdropper is  ...  INDEX TERMS Physical layer security, fading channels, channel state information, estimation error, rate-limited feedback, outdated CSI.  ...  The authors, in [14] , present an earlier survey on physical layer security under the imperfect channel state information (CSI) assumption, with a particular focus on relay channels, cognitive system,  ... 
doi:10.1109/access.2016.2612585 fatcat:lhpjsjnkl5gg7oqjticfmww3x4

Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

Maoqiang Yang, Bangning Zhang, Yuzhen Huang, Nan Yang, Daoxing Guo, Bin Gao
2016 Sensors  
Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper's channel, it explores a zero-forcing beamforming (ZFB)  ...  eavesdropper and one multiple-antenna cooperative jammer.  ...  wiretap channel [14] and in the MISO multi-antenna eavesdropper wiretap channel [15] , respectively.  ... 
doi:10.3390/s16111908 pmid:27845753 pmcid:PMC5134567 fatcat:fv5tfnq2ifdgjh5226bhcwlusi

A Two-Hop Multi-Relay Secure Transmission with Improved Suboptimal Relay Selection Scheme

Lukman A. Olawoyin, Munzali A. Abana, Yue Wu, Hongwen Yang
2016 Journal of Communications  
Index Terms-Artificial noise, best and worst relay, channel state information, secrecy throughput, intercept probability  ...  Abstract-This work studies the use of relay selection in reducing the capability of a hidden eavesdropper to intercept the confidential message transmitted between information source and legitimate receiver  ...  The use of joint cooperative techniques to ensure information secrecy in cognitive system was discussed in [10] while the authors in [11] , [12] discussed the cooperative relaying and power allocation  ... 
doi:10.12720/jcm.11.6.592-597 fatcat:qkeqbvzvsvcppkwr7yljrakbya

Safeguarding Next Generation Multiple Access Using Physical Layer Security Techniques: A Tutorial [article]

Lu Lv, Dongyang Xu, Rose Qingyang Hu, Yinghui Ye, Long Yang, Xianfu Lei, Xianbin Wang, Dong In Kim, Arumugam Nallanathan
2024 arXiv   pre-print
The purpose of this tutorial is to provide a comprehensive overview on the state-of-the-art physical layer security techniques that guarantee wireless security and privacy for NOMA networks, along with  ...  This inspires the embrace of non-orthogonal multiple access (NOMA) in future wireless communication networks.  ...  ACKNOWLEDGEMENT The authors would like to thank the current and past members of the research groups at Xidian University and Xi'an Jiaotong University, for their contributions to the work reported in this  ... 
arXiv:2403.16477v1 fatcat:jc3hu4bxgbfudibqp2nn334jdi

Interplay Between NOMA and Other Emerging Technologies: A Survey

Mojtaba Vaezi, Gayan Amarasuriya, Yuanwei Liu, Ahmed Arafa, Fang Fang, Zhiguo Ding
2019 IEEE Transactions on Cognitive Communications and Networking  
Non-orthogonal multiple access (NOMA) has been widely recognized as a promising way to scale up the number of users, enhance the spectral efficiency, and improve the userfairness in wireless networks,  ...  NOMA can be flexibly combined with many existing wireless technologies and emerging ones including multiple-input multiple-output (MIMO), massive MIMO, millimeter wave communications, cognitive and cooperative  ...  In [47] , for a K-user massive MIMO multi-way relaying, a novel NOMA transmission strategy, which can reduce the number of channel-uses to just two from (K − 1)/2 + 1 in the current state-of-the-art  ... 
doi:10.1109/tccn.2019.2933835 fatcat:5utwrrgtujbsrf7q5yngpcodie

Interplay Between NOMA and Other Emerging Technologies: A Survey [article]

Mojtaba Vaezi, Gayan Amarasuriya, Yuanwei Liu, Ahmed Arafa, Fang Fang,, Zhiguo Ding
2019 arXiv   pre-print
Non-orthogonal multiple access (NOMA) has been widely recognized as a promising way to scale up the number of users, enhance the spectral efficiency, and improve the user fairness in wireless networks,  ...  NOMA can be flexibly combined with many existing wireless technologies and emerging ones including multiple-input multiple-output (MIMO), massive MIMO, millimeter wave communications, cognitive and cooperative  ...  In [47] , for a K-user massive MIMO multi-way relaying, a novel NOMA transmission strategy, which can reduce the number of channel-uses to just two from (K − 1)/2 + 1 in the current state-of-the-art  ... 
arXiv:1903.10489v2 fatcat:4u6soepjfjeiply4v2e2luionm

A Survey on MIMO Transmission with Discrete Input Signals: Technical Challenges, Advances, and Future Trends [article]

Yongpeng Wu, Chengshan Xiao, Zhi Ding, Xiqi Gao, Shi Jin
2017 arXiv   pre-print
, and MIMO wiretap channel.  ...  Multiple antennas have been exploited for spatial multiplexing and diversity transmission in a wide range of communication applications.  ...  For MIMOME wiretap channel without the eavesdropper's CSI, J.-C.  ... 
arXiv:1704.07611v1 fatcat:4gep4gnbefdytjdggniocdora4
« Previous Showing results 1 — 15 out of 60 results