Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








373 Hits in 2.5 sec

A Physical-Layer Secure Coding Scheme for Indoor Visible Light Communication Based on Polar Codes

Zhen Che, Junbin Fang, Zoe Lin Jiang, Jin Li, Shancheng Zhao, Yongchun Zhong, Zhe Chen
2018 IEEE Photonics Journal  
In this paper, a secure coding scheme based on polar codes is proposed to simultaneously achieve physical-layer security and transmission reliability for indoor VLC systems under Wyner's wiretap model.  ...  Since VLC channel is an open wireless channel, physical-layer security is desirable in order to hide secret information from unauthorized receivers, without reliance on upper-layer cryptographic techniques  ...  In addition, Mukherjee et al. proposed a two-stage beamforming design to examine secret key agreement for MISO VLC systems [3] .  ... 
doi:10.1109/jphot.2018.2869931 fatcat:xv46evmlgvgwzkzn4ugcwg4yje

A Survey of Optimization Approaches for Wireless Physical Layer Security [article]

Dong Wang, Bo Bai, Wenbo Zhao, Zhu Han
2019 arXiv   pre-print
The survey begins with typical wiretap channel models to cover common scenarios and systems.  ...  Because of its importance in security designs, the latter research direction is surveyed in a comprehensive way in this paper.  ...  Mutual information, conjugate transpose, broadcast wiretap channels, multiple-access wiretap channels, interference wiretap channels, and relay wiretap channels [10] , etc. 1) MIMO wiretap channels: The  ... 
arXiv:1901.07955v1 fatcat:3pb27rlc45c3dmnjgwmjyspvb4

Adaptive Limited Feedback for MISO Wiretap Channels With Cooperative Jamming

Minyan Pei, A. Lee Swindlehurst, Dongtang Ma, Jibo Wei
2014 IEEE Transactions on Signal Processing  
This paper studies a multi-antenna wiretap channel with a passive eavesdropper and an external helper, where only quantized channel information regarding the legitimate receiver is available at the transmitter  ...  While direct optimization of the secrecy rate is difficult, an approximate upper bound for the mean loss in secrecy rate is derived and a feedback bit allocation method that minimizes the average upper  ...  The MISO wiretap scenario was first considered in [18] , where it was shown that zero-forcing (ZF) beamforming at the helper is nearly optimal in the high signal-to-noise ratio (SNR) regime.  ... 
doi:10.1109/tsp.2013.2295059 fatcat:h5sefvaxgnaxxdgi45z2mb5cry

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [article]

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 arXiv   pre-print
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.  ...  Other lattice code designs for the wiretap channel includes: nested lattices code designs for cooperative jamming, interference channels, and the relay networks [10] , [43] , [44] , the security of  ... 
arXiv:1801.05227v1 fatcat:gktqlyt4wrfhnjdxfvl3vlmhau

Optimal Beamforming for Gaussian MIMO Wiretap Channels with Two Transmit Antennas [article]

Mojtaba Vaezi, Wonjae Shin, H. Vincent Poor
2017 arXiv   pre-print
A Gaussian multiple-input multiple-output wiretap channel in which the eavesdropper and legitimate receiver are equipped with arbitrary numbers of antennas and the transmitter has two antennas is studied  ...  Under an average power constraint, the optimal input covariance to obtain the secrecy capacity of this channel is unknown, in general.  ...  Beamforming for MISO and MIMO Channels The optimal beamforming provided in the previous section achieves the capacity of MISO and MIMO channels without an eavesdropper (G = 0), as shown below. 1) Capacity  ... 
arXiv:1707.06271v1 fatcat:vtp7qcwpareyvc4orccnnpdt64

RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey [article]

Majid H. Khoshafa, Omar Maraqa, Jules M. Moualeu, Sylvester Aboagye, Telex M. N. Ngatched, Mohamed H. Ahmed, Yasser Gadallah, Marco Di Renzo
2024 arXiv   pre-print
However, the evolution towards the 5G technology and beyond poses new security challenges that must be addressed in order to fulfill the unprecedented performance requirements of future wireless networks  ...  potential enabling technologies, RIS has attracted extensive attention due to its ability to proactively and intelligently reconfigure the wireless propagation environment to combat dynamic wireless channel  ...  account for the reliability and secrecy constraints inherent in wiretap channels.  ... 
arXiv:2403.10412v1 fatcat:yjnv3tiarnh4lpwxyam2qtpvqe

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference  ...  This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks.  ...  In [244] , game theory is used by multiple eavesdroppers to decide whether to collude or not in a MISO wiretap channel. B.  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

Optimal Beamforming Design for Secure Transmission with Channel Covariance Uncertainty

Yonghong Tan, Xuhui Wang, Xiangdong Yin
2016 Journal of Information Hiding and Multimedia Signal Processing  
In this paper, we study robust beamforming design for multiple-input single-output (MISO) wiretap channels under CJ by exploiting imperfect channel state information (CSI), in which the source employs  ...  Physical layer security has attracted substantial research interests in recent years.  ...  In this paper, we investigated the robust beamforming design for secure MISO communications with cooperative jamming.  ... 
dblp:journals/jihmsp/TanWY16 fatcat:lj47ygvtcrgspcwjvbiuhhqj44

Secrecy Balancing over Two-User MISO Interference Channels with Rician Fading

Jiqing Ni, Zesong Fei, Chengwen Xing, Di Zhao, Niwei Wang, Jingming Kuang
2013 International Journal of Antennas and Propagation  
This paper considers a 2-user multiple-input single-output (MISO) interference channel with confidential messages (IFC-CM), in which the Rician channel model is assumed.  ...  Simulation results present the secrecy performance over the 2-user MISO IFC-CM scenario.  ...  Later, the work was extended to the Gaussian wiretap channel in [2] .  ... 
doi:10.1155/2013/546260 fatcat:bo2tkkl7jvhmtdhyy3o4o7h3ry

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 IEEE Journal on Selected Areas in Communications  
The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer.  ...  In particular, we focus on the following typical technologies: 1) Physical layer security coding: Although the first physical layer security code appears around 1970s, to design explicit security codes  ...  Other lattice code designs for the wiretap channel includes: nested lattices code designs for cooperative jamming, interference channels, and the relay networks [10, 43, 44] , the security of the continuous  ... 
doi:10.1109/jsac.2018.2825560 fatcat:nanjj67ilvdcfbmfpmo7zppqvy

Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels

Amitav Mukherjee, A. Lee Swindlehurst
2009 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)  
This paper examines linear beamforming methods for secure communications in a multiuser wiretap channel with a single transmitter, multiple legitimate receivers, and a single eavesdropper, where all nodes  ...  We analyze the confidentiality provided by zero-forcing and optimal minimum-power beamforming designs for the broadcast channel, and optimal minimum-MSE beamformers for the multicast channel.  ...  Wyner's landmark paper on secure communications in a point-to-point wiretap channel [1] paved the way for characterizing the secrecy capacity of specific types of multiuser broadcast, This work was supported  ... 
doi:10.1109/allerton.2009.5394865 fatcat:sqavbanwqjeyzgsh4dg43wi55i

Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels [article]

Amitav Mukherjee, A. Lee Swindlehurst
2009 arXiv   pre-print
This paper examines linear beamforming methods for secure communications in a multiuser wiretap channel with a single transmitter, multiple legitimate receivers, and a single eavesdropper, where all nodes  ...  We analyze the confidentiality provided by zero-forcing and optimal minimum-power beamforming designs for the broadcast channel, and optimal minimum-MSE beamformers for the multicast channel.  ...  Wyner's landmark paper on secure communications in a point-to-point wiretap channel [1] paved the way for characterizing the secrecy capacity of specific types of multiuser broadcast, interference, and  ... 
arXiv:0910.2525v1 fatcat:ebuu5megjvfh3h7lwfrxvaebnu

Secure Satellite-Terrestrial Transmission Over Incumbent Terrestrial Networks via Cooperative Beamforming

Jun Du, Chunxiao Jiang, Haijun Zhang, Xiaodong Wang, Yong Ren, Merouane Debbah
2018 IEEE Journal on Selected Areas in Communications  
The secure communication in this coexistence system of the satellite-terrestrial network and cellular network through the physical layer security techniques is studied in this work.  ...  Applying the designed secure beamforming schemes to the coexistence system established, we formulate the secrecy rate maximization problems subjected to the power and transmission quality constraints.  ...  wiretap channels.  ... 
doi:10.1109/jsac.2018.2824623 fatcat:tlmxn5dgefhtzianuf24zvrhxq

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference  ...  This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks.  ...  In [244] , game theory is used by multiple eavesdroppers to decide whether to collude or not in a MISO wiretap channel. B.  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers

2021 KSII Transactions on Internet and Information Systems  
(CSI) of wiretap channel.  ...  We first design the robust joint optimal beamforming of secret signal and AN to minimize transmit power with constraints of security quality of service (QoS), i.e., minimum allowable signal-to-interference-and-noise  ...  Based on deterministic model, [22, 23] studied the secure transmission in MISO channel. [24, 25] considered secure transmit schemes for MISO wiretap channels with cooperative jamming from helper.  ... 
doi:10.3837/tiis.2021.06.015 fatcat:l7ngmvg7tfbbdiva5tisbvjua4
« Previous Showing results 1 — 15 out of 373 results