Results 21 to 30 of about 133,625 (274)

Secrecy capacity over correlated ergodic fading channel [PDF]

open access: yesMILCOM 2008 - 2008 IEEE Military Communications Conference, 2008
We investigate the secrecy capacity of an ergodic fading wiretap channel in which the main channel is correlated with the eavesdropper channel. In this study, the full Channel State Information (CSI) is assumed, and thus the transmitter knows the channel gains of the legitimate receiver and the eavesdropper.
Jeon, Hyoungsuk   +4 more
openaire   +2 more sources

New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel

open access: yesEntropy, 2021
The Gaussian wiretap channel with noncausal state interference available at the transmitter, which is also called the dirty paper wiretap channel (DP-WTC), has been extensively studied in the literature. Recently, it has been shown that taking actions on
Guangfen Xie, Bin Dai
doaj   +1 more source

E - Capacity - Equivocation Region of Wiretap Channel [PDF]

open access: yesJournal of Universal Computer Science, 2021
One of the problems of information - theoretic security concerns secure communication over a wiretap channel. The aim in the general wiretap channel model is to maximize the rate of the reliable communication from the source to the legitimate receiver ...
Mariam Haroutunian
doaj   +3 more sources

On Secrecy Capacity Scaling in Wireless Networks [PDF]

open access: yesIEEE Transactions on Information Theory, 2010
This work studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper nodes are assumed to be placed according to Poisson point processes with intensities $ $ and $ _e$, respectively.
Koyluoglu, O. Ozan   +2 more
openaire   +2 more sources

Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks

open access: yesIEEE Access, 2018
Due to the broadcast nature of wireless transmission, traditional wireless two-hop relaying is vulnerable for eavesdroppers to overhear messages. In order to enhance the physical-layer security, this paper studies one cooperative network with caching ...
Fang Shi   +5 more
doaj   +1 more source

The secrecy capacity of practical quantum cryptography [PDF]

open access: yesSPIE Proceedings, 2003
Quantum cryptography has attracted much recent attention due to its potential for providing secret communications that cannot be decrypted by any amount of computational effort. This is the first analysis of the secrecy of a practical implementation of the BB84 protocol that simultaneously takes into account and presents the {\it full} set of complete ...
Gilbert, G., Hamrick, M.
openaire   +2 more sources

Secure Communications in SWIPT-Enabled Two-Way Relay Networks

open access: yesIEEE Access, 2019
This paper investigates the secrecy performance of a wireless-powered two-way relay network in the presence of an eavesdropper. Based on adaptive time allocation (TA) and power splitting (PS), a novel secure relaying protocol is proposed. For the purpose
Yang Zhang, Xiangmo Zhao, Ying Xie
doaj   +1 more source

Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint

open access: yesInternational Journal of Distributed Sensor Networks, 2015
This paper studies the physical layer security issue for cognitive radio sensor networks (CRSNs) with primary outage constraint, for which a tractable framework is developed to analyze the secrecy performance for CRSNs related to the random channel ...
Hongyu Ma   +4 more
doaj   +1 more source

A Coalitional Formation Game for Physical Layer Security of Cooperative Compressive Sensing Multi-Relay Networks

open access: yesSensors, 2018
Cooperative relaying is an effective technology to improve the capacity of physical-layer security, in which the relay helps forward the received signal to the destination. In this paper, a cooperative compressive sensing and amplify-and-forward (CCS-AF)
Jialun Li   +5 more
doaj   +1 more source

Some New Results on the GaussianWiretap Feedback Channel

open access: yesEntropy, 2019
In this paper, the Gaussian wiretap feedback channel is revisited, and some new resultson its secrecy capacity are obtained. To be specific, first, we show that the Schalkwijk−Kailath (SK)feedback scheme, which achieves the secrecy capacity of the ...
Chenxu Wei, Linman Yu, Bin Dai
doaj   +1 more source

Home - About - Disclaimer - Privacy