A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
[article]
2018
arXiv
pre-print
The evolution towards 5G wireless communications poses new challenges for physical layer security research. ...
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. ...
probability
wide secrecy throughput maximization. ...
arXiv:1801.05227v1
fatcat:gktqlyt4wrfhnjdxfvl3vlmhau
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
keys over public channels. ...
In [244] , game theory is used by multiple eavesdroppers to decide whether to collude or not in a MISO wiretap channel.
B. ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels
2015
IEEE Transactions on Communications
We analyze and optimize the secrecy performance of artificial noise (AN) in multi-input single-output wiretap channels with multiple antennas at the transmitter and a single antenna at the receiver and ...
We show that the maximum effective secrecy throughput requires more power to be allocated to the AN signal when the quality of the transmitterreceiver channel or the transmitter-eavesdropper channel improves ...
CONCLUSIONS We proposed two transmission schemes using AN that maximize the EST in MISO wiretap channels with a passive eavesdropper. ...
doi:10.1109/tcomm.2015.2419634
fatcat:ucjwlm6bkbe5jg3bslgoo33igq
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
keys over public channels. ...
In [244] , game theory is used by multiple eavesdroppers to decide whether to collude or not in a MISO wiretap channel.
B. ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
A Survey of Optimization Approaches for Wireless Physical Layer Security
[article]
2019
arXiv
pre-print
The survey begins with typical wiretap channel models to cover common scenarios and systems. ...
, secrecy outrage probability minimization, power consumption minimization, and secure energy efficiency maximization. ...
single-output (MISO) channels. ...
arXiv:1901.07955v1
fatcat:3pb27rlc45c3dmnjgwmjyspvb4
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
2018
IEEE Journal on Selected Areas in Communications
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. ...
The evolution towards 5G wireless communications poses new challenges for physical layer security research. ...
In addition, the deployment of the full duplex receivers is optimized for the network-wide secrecy throughput maximization. T. ...
doi:10.1109/jsac.2018.2825560
fatcat:nanjj67ilvdcfbmfpmo7zppqvy
An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty
2016
IEEE Access
In this vein, it has been shown that fading channels can enhance the transmission of confidential information and that a secure communication can be achieved even when the channel to the eavesdropper is ...
better than the main channel. ...
The performance analyses of a multi-cell MISO downlink system, where a multi-antenna base station transmits confidential messages to its legitimate users with a passive eavesdropper present in each cell ...
doi:10.1109/access.2016.2612585
fatcat:lhpjsjnkl5gg7oqjticfmww3x4
Adaptive Limited Feedback for MISO Wiretap Channels With Cooperative Jamming
2014
IEEE Transactions on Signal Processing
This paper studies a multi-antenna wiretap channel with a passive eavesdropper and an external helper, where only quantized channel information regarding the legitimate receiver is available at the transmitter ...
Assuming zero-forcing transmission at the helper and random vector quantization of the channels, an analytic expression for the achievable ergodic secrecy rate due to the resulting quantization errors ...
System Model We consider a MISO wiretap channel that includes a transmitter (Alice), a legitimate receiver (Bob), a friendly jammer (Helper) and an eavesdropper (Eve). ...
doi:10.1109/tsp.2013.2295059
fatcat:h5sefvaxgnaxxdgi45z2mb5cry
Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey
2019
Zenodo
This paper provides a comprehensive review of information-theoretic measures of the secrecy performance in physical layer security. ...
The main idea of physical layer security is to take advantage of the features of the wireless channel and its impairments in order to ensure secure communication in the physical layer. ...
Particularly, it was developed the optimal power allocation between AN and the signal of interest that maximizes the secrecy throughput for AN beamforming. ...
doi:10.5281/zenodo.3532040
fatcat:lct4ai7lf5hzpmepwqwv6e72t4
Secrecy Enhancement of Multiuser MISO Networks Using OSTBC and Artificial Noise
2017
IEEE Transactions on Vehicular Technology
To evaluate the secrecy performance of the proposed OSTBC-SC-AN and OSTBC-SWC-AN schemes, we derive new exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput ...
Moreover, two opportunistic scheduling schemes, namely, selection combining (SC) and scan-and-wait combining (SWC), are leveraged to select one legitimate user for data transmission. ...
We derived new exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput to evaluate the secrecy performance achieved by the proposed OSTBC-SC-AN and OSTBC-SWC-AN ...
doi:10.1109/tvt.2017.2725643
fatcat:l72yx25uazfbdggn6glwo3pg4i
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey
[article]
2013
arXiv
pre-print
Finally, the open problems for the on-going and future research are discussed. ...
We first present an overview of the main information-theoretic measures of the secrecy performance with imperfect CSI. ...
The s.d.o.f region for single-user Gaussian multi-input, multi-output (MIMO) wiretap channel was investigated in [20] . ...
arXiv:1307.4146v2
fatcat:nvho2lziqjep5my2zlibtk6hpm
Secrecy Outage of SWIPT in the Presence of Cooperating Eavesdroppers
[article]
2019
arXiv
pre-print
We derive a closed-form expression for the secrecy outage probability of the considered Multiple-Input-Multiple-Output Multiple-Eavesdroppers system. ...
This work investigates the secrecy performance for a simultaneous wireless information and power transfer system that operates in the presence of cooperating eavesdroppers. ...
The AP is assumed to have CSI for main channel to S as well as CSI of wiretap channels from AP to the eavesdroppers [9, 10] . ...
arXiv:1903.03522v1
fatcat:c6cukwpi3ffkpmrrq2u4pm6e24
Secrecy outage of SWIPT in the presence of cooperating eavesdroppers
2017
Zenodo
We derive a closed-form expression for the secrecy outage probability of the considered Multiple-Input-Multiple-Output Multiple-Eavesdroppers system. ...
The multi-antenna access point's transmission is used for information-decoding by a multi-antenna node and for energy-harvesting (EH) by multiple single-antenna nodes. ...
The AP is assumed to have CSI for main channel to S as well as CSI of wiretap channels from AP to the eavesdroppers [9, 10] . ...
doi:10.5281/zenodo.2587177
fatcat:y5wkhhejmzh5fi2dyqx24zx2ja
Survey on Physical Layer Security for 5G Wireless Networks
[article]
2020
arXiv
pre-print
This work introduces a comprehensive review of the main information-theoretic metrics used to measure the secrecy performance in physical layer security. ...
Furthermore, a theoretical framework related to the most commonly used physical layer security techniques to improve the secrecy performance is provided. ...
Fig. 1 1 The wiretap channel model consisting of two legitimate nodes and an eavesdropper.
Fig. 2 2 The model of AN network for a wiretap channel consisting of two main nodes and an eavesdropper. ...
arXiv:2006.08044v1
fatcat:r5l25bicwjhanidz3qu7bbi4mi
RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey
[article]
2024
arXiv
pre-print
Physical layer security (PLS) has received a growing interest from the research community for its ability to safeguard data confidentiality without relying on key distribution or encryption/decryption. ...
potential enabling technologies, RIS has attracted extensive attention due to its ability to proactively and intelligently reconfigure the wireless propagation environment to combat dynamic wireless channel ...
account for the reliability and secrecy constraints inherent in wiretap channels. ...
arXiv:2403.10412v1
fatcat:yjnv3tiarnh4lpwxyam2qtpvqe
« Previous
Showing results 1 — 15 out of 158 results