A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Physical-Layer Secure Coding Scheme for Indoor Visible Light Communication Based on Polar Codes
2018
IEEE Photonics Journal
In this paper, a secure coding scheme based on polar codes is proposed to simultaneously achieve physical-layer security and transmission reliability for indoor VLC systems under Wyner's wiretap model. ...
Since VLC channel is an open wireless channel, physical-layer security is desirable in order to hide secret information from unauthorized receivers, without reliance on upper-layer cryptographic techniques ...
In addition, Mukherjee et al. proposed a two-stage beamforming design to examine secret key agreement for MISO VLC systems [3] . ...
doi:10.1109/jphot.2018.2869931
fatcat:xv46evmlgvgwzkzn4ugcwg4yje
A Survey of Optimization Approaches for Wireless Physical Layer Security
[article]
2019
arXiv
pre-print
The survey begins with typical wiretap channel models to cover common scenarios and systems. ...
Because of its importance in security designs, the latter research direction is surveyed in a comprehensive way in this paper. ...
Mutual information, conjugate transpose, broadcast wiretap channels, multiple-access wiretap channels, interference wiretap channels, and relay wiretap channels [10] , etc. 1) MIMO wiretap channels: The ...
arXiv:1901.07955v1
fatcat:3pb27rlc45c3dmnjgwmjyspvb4
Adaptive Limited Feedback for MISO Wiretap Channels With Cooperative Jamming
2014
IEEE Transactions on Signal Processing
This paper studies a multi-antenna wiretap channel with a passive eavesdropper and an external helper, where only quantized channel information regarding the legitimate receiver is available at the transmitter ...
While direct optimization of the secrecy rate is difficult, an approximate upper bound for the mean loss in secrecy rate is derived and a feedback bit allocation method that minimizes the average upper ...
The MISO wiretap scenario was first considered in [18] , where it was shown that zero-forcing (ZF) beamforming at the helper is nearly optimal in the high signal-to-noise ratio (SNR) regime. ...
doi:10.1109/tsp.2013.2295059
fatcat:h5sefvaxgnaxxdgi45z2mb5cry
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
[article]
2018
arXiv
pre-print
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. ...
Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed. ...
Other lattice code designs for the wiretap channel includes: nested lattices code designs for cooperative jamming, interference channels, and the relay networks [10] , [43] , [44] , the security of ...
arXiv:1801.05227v1
fatcat:gktqlyt4wrfhnjdxfvl3vlmhau
Optimal Beamforming for Gaussian MIMO Wiretap Channels with Two Transmit Antennas
[article]
2017
arXiv
pre-print
A Gaussian multiple-input multiple-output wiretap channel in which the eavesdropper and legitimate receiver are equipped with arbitrary numbers of antennas and the transmitter has two antennas is studied ...
Under an average power constraint, the optimal input covariance to obtain the secrecy capacity of this channel is unknown, in general. ...
Beamforming for MISO and MIMO Channels The optimal beamforming provided in the previous section achieves the capacity of MISO and MIMO channels without an eavesdropper (G = 0), as shown below. 1) Capacity ...
arXiv:1707.06271v1
fatcat:vtp7qcwpareyvc4orccnnpdt64
RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey
[article]
2024
arXiv
pre-print
However, the evolution towards the 5G technology and beyond poses new security challenges that must be addressed in order to fulfill the unprecedented performance requirements of future wireless networks ...
potential enabling technologies, RIS has attracted extensive attention due to its ability to proactively and intelligently reconfigure the wireless propagation environment to combat dynamic wireless channel ...
account for the reliability and secrecy constraints inherent in wiretap channels. ...
arXiv:2403.10412v1
fatcat:yjnv3tiarnh4lpwxyam2qtpvqe
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference ...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
In [244] , game theory is used by multiple eavesdroppers to decide whether to collude or not in a MISO wiretap channel.
B. ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
Optimal Beamforming Design for Secure Transmission with Channel Covariance Uncertainty
2016
Journal of Information Hiding and Multimedia Signal Processing
In this paper, we study robust beamforming design for multiple-input single-output (MISO) wiretap channels under CJ by exploiting imperfect channel state information (CSI), in which the source employs ...
Physical layer security has attracted substantial research interests in recent years. ...
In this paper, we investigated the robust beamforming design for secure MISO communications with cooperative jamming. ...
dblp:journals/jihmsp/TanWY16
fatcat:lj47ygvtcrgspcwjvbiuhhqj44
Secrecy Balancing over Two-User MISO Interference Channels with Rician Fading
2013
International Journal of Antennas and Propagation
This paper considers a 2-user multiple-input single-output (MISO) interference channel with confidential messages (IFC-CM), in which the Rician channel model is assumed. ...
Simulation results present the secrecy performance over the 2-user MISO IFC-CM scenario. ...
Later, the work was extended to the Gaussian wiretap channel in [2] . ...
doi:10.1155/2013/546260
fatcat:bo2tkkl7jvhmtdhyy3o4o7h3ry
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
2018
IEEE Journal on Selected Areas in Communications
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. ...
In particular, we focus on the following typical technologies: 1) Physical layer security coding: Although the first physical layer security code appears around 1970s, to design explicit security codes ...
Other lattice code designs for the wiretap channel includes: nested lattices code designs for cooperative jamming, interference channels, and the relay networks [10, 43, 44] , the security of the continuous ...
doi:10.1109/jsac.2018.2825560
fatcat:nanjj67ilvdcfbmfpmo7zppqvy
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels
2009
2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)
This paper examines linear beamforming methods for secure communications in a multiuser wiretap channel with a single transmitter, multiple legitimate receivers, and a single eavesdropper, where all nodes ...
We analyze the confidentiality provided by zero-forcing and optimal minimum-power beamforming designs for the broadcast channel, and optimal minimum-MSE beamformers for the multicast channel. ...
Wyner's landmark paper on secure communications in a point-to-point wiretap channel [1] paved the way for characterizing the secrecy capacity of specific types of multiuser broadcast, This work was supported ...
doi:10.1109/allerton.2009.5394865
fatcat:sqavbanwqjeyzgsh4dg43wi55i
Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels
[article]
2009
arXiv
pre-print
This paper examines linear beamforming methods for secure communications in a multiuser wiretap channel with a single transmitter, multiple legitimate receivers, and a single eavesdropper, where all nodes ...
We analyze the confidentiality provided by zero-forcing and optimal minimum-power beamforming designs for the broadcast channel, and optimal minimum-MSE beamformers for the multicast channel. ...
Wyner's landmark paper on secure communications in a point-to-point wiretap channel [1] paved the way for characterizing the secrecy capacity of specific types of multiuser broadcast, interference, and ...
arXiv:0910.2525v1
fatcat:ebuu5megjvfh3h7lwfrxvaebnu
Secure Satellite-Terrestrial Transmission Over Incumbent Terrestrial Networks via Cooperative Beamforming
2018
IEEE Journal on Selected Areas in Communications
The secure communication in this coexistence system of the satellite-terrestrial network and cellular network through the physical layer security techniques is studied in this work. ...
Applying the designed secure beamforming schemes to the coexistence system established, we formulate the secrecy rate maximization problems subjected to the power and transmission quality constraints. ...
wiretap channels. ...
doi:10.1109/jsac.2018.2824623
fatcat:tlmxn5dgefhtzianuf24zvrhxq
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference ...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
In [244] , game theory is used by multiple eavesdroppers to decide whether to collude or not in a MISO wiretap channel.
B. ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers
2021
KSII Transactions on Internet and Information Systems
(CSI) of wiretap channel. ...
We first design the robust joint optimal beamforming of secret signal and AN to minimize transmit power with constraints of security quality of service (QoS), i.e., minimum allowable signal-to-interference-and-noise ...
Based on deterministic model, [22, 23] studied the secure transmission in MISO channel. [24, 25] considered secure transmit schemes for MISO wiretap channels with cooperative jamming from helper. ...
doi:10.3837/tiis.2021.06.015
fatcat:l7ngmvg7tfbbdiva5tisbvjua4
« Previous
Showing results 1 — 15 out of 373 results