Results 11 to 20 of about 18,041 (194)

On the Ergodic Secrecy Rate of Massive MIMO Transmission with Partial Legitimate User CSI

open access: closed2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), 2019
In this paper, we consider the downlink transmission over a single-cell massive multiple-input-multiple-output (MIMO) system in the presence of multiple single-antenna eavesdroppers (massive MIMOME). We concentrate on the practical scenario where partial channel state information (CSI) of legitimate users and no CSI of eavesdroppers are available at ...
Tingnan Bao   +2 more
semanticscholar   +4 more sources

A new achievable ergodic secrecy rate region for the fading multiple access wiretap channel [PDF]

open access: closed2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2009
We give a new achievable ergodic secrecy rate region for the two-user fading multiple access wiretap channel. Our scheme creates a vector channel between the two transmitters and the intended receiver that has full-rank and creates another vector channel between the two transmitters and the eavesdropper whose rank is 1.
Raef Bassily, Şennur Ulukuş
semanticscholar   +3 more sources

Secrecy Rate Region Enhancement in Multiple Access Wiretap Channel

open access: yesJournal of Telecommunications and Information Technology, 2022
It is commonly known that physical layer security is achieved with a trade-off in terms of the achievable rate. Hence, security constraints generate rate losses in wiretap channels.
Shahid Mehraj Shah
doaj   +2 more sources

Intelligent-Reflecting-Surface-Assisted Single-Input Single-Output Secure Transmission: A Joint Multiplicative Perturbation and Constructive Reflection Perspective [PDF]

open access: yesEntropy
Due to the inherent broadcasting nature and openness of wireless transmission channels, wireless communication systems are vulnerable to the eavesdropping of malicious attackers and usually encounter undesirable situations of information leakage.
Chaowen Liu   +5 more
doaj   +2 more sources

Physical Layer Security Design for FDD IM-OTFS Transmissions Based on Secure Mapping

open access: yesIEEE Access, 2023
In this paper, a physical layer security scheme is proposed for index modulation aided orthogonal time frequency space (IM-OTFS) modulation systems working in Frequency Division Duplex (FDD) mode.
Kejia Ma   +3 more
doaj   +1 more source

Secure Massive MIMO Downlink With Low-Resolution ADCs/DACs in the Presence of Active Eavesdropping

open access: yesIEEE Access, 2020
In this paper we study the secrecy performance of a downlink massive multiple-input multiple-output (MIMO) system in the presence of pilot spoofing attack (PSA). Specifically, the base station (BS), which is equipped with low-resolution analog-to-digital
Qian Xu, Pinyi Ren
doaj   +1 more source

Physical Layer Security Enhancement via IRS Based on PD-NOMA and Cooperative Jamming

open access: yesIEEE Access, 2023
Intelligence reconfigurable surfaces (IRS) have attracted attention due to their ability to create an intelligent and controllable wireless propagation environment for supporting an efficient, and secure design.
Afshin Souzani   +3 more
doaj   +1 more source

RIS-Aided Physical Layer Security With Full-Duplex Jamming in Underlay D2D Networks

open access: yesIEEE Access, 2021
This paper investigates the physical layer security and data transmission for the underlay device-to-device (D2D) networks, and considers a combination of the reconfigurable intelligent surface (RIS) and full-duplex (FD) jamming receiver for the ...
Waqas Khalid   +4 more
doaj   +1 more source

Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback [PDF]

open access: yes, 2013
Channel state information (CSI) at the transmitter is of importance to the performance of physical layer security based on multi-antenna networks. Specifically, CSI is not only beneficial to improve the capacity of the legitimate channel, but also can be
Chen, Xiaoming, Yin, Rui
core   +1 more source

Secure Transmission With Aid of a Helper for MIMOME Network Having Finite Alphabet Inputs

open access: yesIEEE Access, 2017
This paper considers secure transmission with the aid of a helper for finite alphabet signals in multiple-input-multiple-output multiple antenna eavesdropper networks, where the helper transmits a jamming signal along with the confidential message sent ...
Kuo Cao   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy