Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








214 Hits in 4.1 sec

Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers [article]

Gaojie Chen and Justin P. Coon and Marco Di Renzo
2017 arXiv   pre-print
For both of these models, we obtain expressions for the secrecy outage probability in the downlink for HD and FD UE operation.  ...  We analyze the secrecy outage probability in the downlink for wireless networks with spatially (Poisson) distributed eavesdroppers (EDs) under the assumption that the base station employs transmit antenna  ...  We also would like to thank the anonymous reviewers and the editor for their constructive comments.  ... 
arXiv:1701.00982v1 fatcat:c4jedletrjcifma4qljysds4gu

Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers

Gaojie Chen, Justin P. Coon, Marco Di Renzo
2017 IEEE Transactions on Information Forensics and Security  
For both of these models, we obtain expressions for the secrecy outage probability in the downlink for the HD and FD UE operation.  ...  We analyze the secrecy outage probability in the downlink for wireless networks with spatially (Poisson) distributed eavesdroppers (EDs) under the assumption that the base station employs transmit antenna  ...  They also would like to thank the anonymous reviewers and the editor for their constructive comments.  ... 
doi:10.1109/tifs.2017.2656462 fatcat:qi7gpwoo3zdjjks5dsue7gdtwa

Secrecy Enhancement by Antenna Selection and FD Communication with Randomly Located Eavesdroppers

Gaojie Chen, Justin P. Coon, Marco Di Renzo
2016 2016 IEEE Global Communications Conference (GLOBECOM)  
This paper investigates the secrecy connectivity probability for wireless networks with transmit antenna selection in the presence of randomly located eavesdroppers.  ...  The probabilities of secrecy connectivity are given in the closed form and integral form for half-duplex and full-duplex receivers, respectively.  ...  Theoretical vs numerical secrecy outage probabilities for the HD UE in the presence of different numbers of eavesdroppers, where dBU = 10 m and R = 100 m.  ... 
doi:10.1109/glocom.2016.7842245 dblp:conf/globecom/ChenCR16 fatcat:g453vra6arbdplo7yxgplhq7ue

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [article]

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 arXiv   pre-print
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.  ...  presence of a massive MIMO eavesdropper [56] , [57] , secrecy outage probability analysis for massive MIMO systems [58] , etc.  ... 
arXiv:1801.05227v1 fatcat:gktqlyt4wrfhnjdxfvl3vlmhau

On Secrecy Outage Probability and Average Secrecy Rate of Large-Scale Cellular Networks

Liwei Tao, Weiwei Yang, Yueming Cai, Dechuan Chen
2018 Wireless Communications and Mobile Computing  
We first derive closed-formed expressions of secrecy outage probability and average secrecy rate of a single-antenna system for both noncooperative and cooperative eavesdroppers scenarios.  ...  Finally, the results show the small-scale fading has a considerable effect on the secrecy performance in certain density of eavesdroppers and small path loss exponent environment, and when the interference  ...  Acknowledgments This work was supported by the National Natural Science Foundation of China (no. 61471393 and no. 61771487).  ... 
doi:10.1155/2018/6869189 fatcat:5ljsygoz2badpn4leqf6fcag5u

Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey

José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes
2019 Zenodo  
This paper provides a comprehensive review of information-theoretic measures of the secrecy performance in physical layer security.  ...  The main idea of physical layer security is to take advantage of the features of the wireless channel and its impairments in order to ensure secure communication in the physical layer.  ...  Recently, in [51] was developed an algorithm to optimize power allocation of beam transmission for single-cell massive MIMO in presence of passive eavesdropper with multiple antennas.  ... 
doi:10.5281/zenodo.3532040 fatcat:lct4ai7lf5hzpmepwqwv6e72t4

Secrecy Outage Analysis in Random Wireless Networks With Antenna Selection and User Ordering

Gaojie Chen, Justin P. Coon
2017 IEEE Wireless Communications Letters  
UEs are positioned randomly according to a Poisson point process (PPP) in the presence of independently acting eavesdroppers (EDs), the locations of which are again modeled as a PPP.  ...  This paper investigates the secrecy outage probability in the downlink when the target user equipment (UE) is selected based on an ordering metric.  ...  Such information can be more easily obtained at the BS in practice. V. CONCLUSION In this paper, we proposed a method of enhancing secrecy in wireless networks with randomly located EDs and UEs.  ... 
doi:10.1109/lwc.2017.2689024 fatcat:j7dvjbhk7nbfnhqwdf7ehst45y

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 IEEE Journal on Selected Areas in Communications  
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed. Y.  ...  of a massive MIMO eavesdropper [56, 57] , secrecy outage probability analysis for massive MIMO systems [58] , etc.  ... 
doi:10.1109/jsac.2018.2825560 fatcat:nanjj67ilvdcfbmfpmo7zppqvy

Physical Layer Security in Nonorthogonal Multiple Access Wireless Network with Jammer Selection

Langtao Hu, Xin Zheng, Chunsheng Chen
2019 Security and Communication Networks  
The physical layer security of downlink nonorthogonal multiple access (NOMA) network is analyzed. In order to improve the secrecy probability, friendly jammers are jointed in the NOMA network.  ...  A stochastic geometry approach is applied to analyze the outage probability and the secrecy probability.  ...  NOMA User Secrecy Probability We investigate the secrecy probability of a randomly located NOMA user.  ... 
doi:10.1155/2019/7869317 fatcat:xpuglqgqdfgb5crbvrj7dpnvvu

Imperfect jamming cancellation on NOMA networks with randomly located eavesdroppers

G. M. da Silva, D. P. M. Osorio, M. Latva-aho
2021 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)  
This paper addresses the secrecy performance of the downlink of a non-orthogonal multiple access network in the presence of multiple randomly located eavesdroppers.  ...  Integral-form exact and closed-form approximate expressions for the secrecy outage probability are derived by employing stochastic geometry tools.  ...  Herein, we analyze the secrecy outage probability in the downlink of a power-domain NOMA network.  ... 
doi:10.1109/pimrc50174.2021.9569573 fatcat:zye5k27edbasnjvzqg3mtxqyka

Physical Layer Security in Uplink NOMA Multi-Antenna Systems with Randomly Distributed Eavesdroppers [article]

Gerardo Gomez, Francisco J. Martin-Vega, F. Javier Lopez-Martinez, Yuanwei Liu, Maged Elkashlan
2018 arXiv   pre-print
The impact of imperfect successive interference cancellation is also taken into account in this work. Our analysis allows an easy selection of the wiretap code rates that maximizes the EST.  ...  A stochastic geometry approach is applied to analyze the coverage probability and the effective secrecy throughput (EST) of the kth NOMA user, where a fixed or an adaptive transmission rate can be used  ...  ACKNOWLEDGEMENTS This work has been supported by the Spanish Government (Ministerio de Economía y Competitividad) under grant TEC2016-80090-C2-1-R, and Universidad de Málaga.  ... 
arXiv:1709.04693v2 fatcat:zyeokw4lw5fl3nhvm73ukhql4q

Impact of Artificial Noise on Cellular Networks: A Stochastic Geometry Approach

Hui-Ming Wang, Chao Wang, Tong-Xing Zheng, Tony Q. S. Quek
2016 IEEE Transactions on Wireless Communications  
of a randomly chosen CU in the target cell.  ...  The analytical results of the average connection outage and the secrecy outage of its cellular user (CU) in the target cell are given, which facilitates the evaluation of the average secrecy throughput  ...  CONNECTION AND SECRECY OUTAGE ANALYSIS In this section, we provide connection outage and secrecy outage analysis of a CU in the target cell affected by the AN assisted secure transmission scheme.  ... 
doi:10.1109/twc.2016.2601903 fatcat:7bqeyh2vpbd2zljlcqn32ztvmm

MIMO multi-user secrecy rate analysis

Giovanni Geraci, Sarabjot Singh, Jeffrey G. Andrews, Jinhong Yuan, Iain B. Collings
2014 2014 IEEE International Conference on Communications (ICC)  
, in the presence of external eavesdroppers randomly located according to a Poisson point process (PPP).  ...  By using techniques from stochastic geometry and random matrix theory, we obtain explicit expressions for the secrecy outage probability and mean secrecy rate achievable with regularized channel inversion  ...  users, in the presence of randomly located external eavesdroppers.  ... 
doi:10.1109/icc.2014.6883454 dblp:conf/icc/GeraciSAYC14 fatcat:dxbcymtnorgdpegundpaxzbrh4

Secrecy Rates in the Broadcast Channel with Confidential Messages and External Eavesdroppers [article]

Giovanni Geraci, Sarabjot Singh, Jeffrey G. Andrews, Jinhong Yuan, and Iain B. Collings
2013 arXiv   pre-print
users, in the presence of randomly located external eavesdroppers.  ...  We obtain explicit expressions for the probability of secrecy outage and an upper bound on the rate loss due to the presence of external eavesdroppers.  ...  users, in the presence of randomly located external eavesdroppers.  ... 
arXiv:1306.2101v1 fatcat:25el7rh4hfdbjm63uf3mdmdpja

Secrecy analysis in visible light communication systems with randomly located eavesdroppers

Sunghwan Cho, Gaojie Chen, Justin P. Coon
2017 2017 IEEE International Conference on Communications Workshops (ICC Workshops)  
We investigate the secrecy connectivity in visible light communication in the presence of randomly located eavesdroppers.  ...  We apply spatial point processes to characterize the unknown eavesdropper locations. The closed-form of the secrecy outage probability is derived as a function of the density of eavesdroppers.  ...  To further enhance the secrecy performance, in this paper, we investigate the secrecy outage probability of the downlink 1 for VLC by using the LED selection scheme when eavesdroppers are randomly distributed  ... 
doi:10.1109/iccw.2017.7962703 dblp:conf/icc/ChoCC17 fatcat:xcdlcw2bk5eyplrgkqbmcxzl24
« Previous Showing results 1 — 15 out of 214 results